• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

It is perhaps inevitable that for an entire generation, the word "disaster" will be inexorably linked to the horrific events that shattered a pleasant morning in New York City and Washington, D.C., on September 11, 2001.

Extracts from this document...

Introduction

It is perhaps inevitable that for an entire generation, the word "disaster" will be inexorably linked to the horrific events that shattered a pleasant morning in New York City and Washington, D.C., on September 11, 2001. Perhaps the most important lesson to be learned from 9/11, from a disaster recovery perspective, is one of business dependency on information technology and, by extension, its vulnerability to the unplanned interruption of access to information technology (IT) of infrastructure. Driven by the incentives of cost-efficiency and competition, business has placed more and more of its critical information assets into automated systems and networks. This, in turn, has made business dependent upon the uninterrupted function of the machine, a dependency rarely perceived by those within the corporation who have no direct contact with the IT infrastructure itself. The consequences of a loss of access to the IT infrastructure to the business may never be considered-until a disaster occurs. By then, it is often too late. Disaster Planning consists of a set of activities intended to prevent avoidable instances of unplanned interruption, regardless of cause, and to minimize the impact of interruption events that cannot be avoided. To plan is the act of formulating a program for a definite course of action. The term disaster, in the context of this essay, means the unplanned interruption of normal business processes resulting from the interruption of the information technology (IT) ...read more.

Middle

Disaster planning supports this requirement by establishing thorough plans, procedures, and technical measures that can enable a system to be recovered quickly and effectively following a service disruption or disaster. The business resumption plan should aim at achieving a systematic and orderly resumption of all the organizations IT services. The plan should provide for restoring service as soon as possible. Those functions that are most critical to achieving the agency mission must remain in operation during the recovery period. There are nine major phases in the disaster planning process, they are namely: Project Planning, Critical Business Requirements, Recovery Strategies, Emergency Response/Problem Escalation, Plan Activation, Recovery Operations, Training, Testing, and Plan Maintenance. In the Project Planning phase we define the project scope, organize the project, and identify the resources needed. Within this phase a preliminary management commitment is obtained, a disaster recovery/business resumption manager is designated, a disaster recovery/business resumption planning team is organized, current recovery preparedness is audited, the project schedule developed, documentation procedures specified, the recovery program overview defined, and the scope and aim of the disaster recovery/business resumption plan identified. Within the Critical Business Requirements phase we identify the business functions most important to protect, and the means to protect them, analyse risks, threats, and vulnerabilities. An organisation may carry out hundreds of operations that management and staff consider important. ...read more.

Conclusion

This is an important goal in the event that paper or electronic versions of the plan are unavailable for the first few hours resulting from the extent of the disaster. The Testing phase makes sure the plan works effectively. Plan testing is a critical element of a viable contingency capability. Testing enables plan deficiencies to be identified and addressed. Testing also helps evaluate the ability of the recovery staff to implement the plan quickly and effectively. Each IT contingency plan element should be tested to confirm the accuracy of individual recovery procedures and the overall effectiveness of the plan. The final phase, the Plan Maintenance phase makes changes and additions to keep the plan current. To be effective, the plan must be maintained in a ready state that accurately reflects system requirements, procedures, organizational structure, and policies. IT systems undergo frequent changes because of shifting business needs, technology upgrades, or new internal or external policies. Therefore, it is essential that the contingency plan be reviewed and updated regularly, as part of the organization's change management process, to ensure new information is documented and contingency measures are revised if required. As a general rule, the plan should be reviewed for accuracy and completeness at least annually or whenever significant changes occur to any element of the plan. Certain elements will require more frequent reviews, such as contact lists. Based on the system type and criticality, it may be reasonable to evaluate plan contents and procedures more frequently. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Organizational conflict is inevitable in a formal organization. Discuss.

    Organizational politics can then be described as the use of divisive tactics/ strategies to gain/ maintain control, or to elevate performance by fostering competition in the work place or within the industry for the organizational growth. It involves manoeuvring interpersonal arm wrestling, horse-trading, and power plays that exist in most work organizations.

  2. The purpose of this document is to define the Context of Cain Motors Information ...

    Risks are the possible occurrence of events that could have a beneficial or adverse effect on a project. * In PRINCE there are two types of Risk: o Business e.g.: * Market change * Legislation o Project e.g.: * Poor performance of a 3rd party supplier * Resource performance levels

  1. Business Operations

    Inventory - Southwest Airlines currently use the point to point method which means that they are having to hold their stock such as spare parts, snacks and fuel at various airports where as if they were to adopt the "Hub and Spoke" they could hold all their inventory in the

  2. business plan and organise event

    the leaflets that are put around various destinations in the 6th form common room, I will be relying on this to get the information out to my target market, another major sources of communication is going to be word of mouth, I will want to gather enough interest from a

  1. Apple Incorporation - Case Analysis

    Apple's product differentiation in the iPod and iTunes sector will be short-lived since it has a dependency on third parties and also because competitors can easily enter the market. Apple must position itself as the only competitor in the market with stem-to-stern computing solutions.

  2. "Feasibility study of starting a new business".

    By referring to the table "Population Census 2001 Maidenhead and the borough" appendix 1.0 it is evident that out of 133,606 people 37,113 are in the age segment I would be targeting most, and it is not to say the nightclub will not attract person's older than 39 and so

  1. Detailed report on starting a new business

    This is because using the "crucial pricing point" makes my goods seem cheaper, so I will sell more. The reason that I will use penetration pricing is that this should attract customers, destroyer pricing is impractical as I would find it hard to compete with the large companies like Dixon's, or Currys.

  2. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    A true appropriate functional requirement can only be derived with the detailed knowledge of the organisation uniquely possessed by those within the organisation. Sahay and Walsham (1996) identify factors and conditions under which GIS implementation is impeded or enabled, which they term as inhibiting and enabling factors respectively.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work