• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The survivability and continuity characteristics of the IT infrastructure for the Illinois Emergency Management Agency (IEMA) are the subjects of this case study.

Extracts from this document...

Introduction

Introduction

The Case Subject

The survivability and continuity characteristics of the IT infrastructure for the Illinois Emergency Management Agency (IEMA) are the subjects of this case study.  On the agency website, IEMA publicly states its mission:

To protect the State of Illinois through integrated approaches of Emergency Management and Homeland Security to prepare for, respond to, mitigate against and recover from emergencies and disasters, or acts of terrorism.

IEMA has 15 facilities located around the State, and 4 mobile command posts, which provide communications resources and meeting facilities.  In addition, the infrastructure includes connections with 6 nuclear power plants around the State.  The agency has around 260 employees, the majority of which work in the Division of Nuclear Safety.  

Case Study Focus

This case study first examines the current systems with respect to survivability and performance characteristics of the overall IT infrastructure, and then considers potential improvements to that infrastructure.  For manageability, our study is weighted towards functions of the Division of Nuclear Safety.  IEMA’s Division of Nuclear Safety monitors 11 nuclear power reactors at six nuclear stations licensed to generate electricity in Illinois; inspects and escorts spent nuclear fuel shipments; and ensures public safety through inspection, licensing, accreditation and certification of medical professionals, radiation-producing equipment and facilities.

In this case study, IT infrastructure documentation, and information regarding “critical agency functions” and “critical applications to support those functions” was made available.  This access to information is critical to a successful, accurate assessment, and cannot be over-valued.  

Current Issues

1) The merging of two agencies, and IT infrastructures, into one agency and IT infrastructure.

...read more.

Middle

Findings:

Summary of Critical Applications

An assessment of applications that are run from each Agency facility was made.  From this assessment, critical agency functions and supporting applications were identified.  

The Illinois Department of Central Management Services (CMS) provided a method of ranking agency applications.  This method requires that applications be assigned a category number from 1 to 5 using the following guidelines, which were approved by the Governor’s Office for use by all State agencies:

Category One – Human Safety

Any resources that directly impact the lives and safety of Illinois citizens, including state employees. Examples: Police, Fire, Medical, Corrections, Child Welfare, etc.

Category Two – Welfare Human Service

Any resources that directly impact the well being of Illinois citizens.  Examples: Assistance, Benefits, Vital Records, etc.

Category Three – Non-Welfare Human Service

A human service resource that indirectly impacts the welfare of Illinois citizens. Examples: Registries, Licensure, Tracking, Vendor related, etc.

Category Four – Administrative State Functions & Processes

Resources that support the administration of state processes. Examples: Payroll, Compensation, Procurement, Accounts Payable, etc.

Category Five – Support of Specific Agency Functions & Processes

Resources related to the maintenance of a specific agency function or process.

Examples: Laboratory, Utilities, Diagnostics, Statistical systems, Application Code Tools, etc.

Based on those categories, the following tables, taken directly from the IEMA Disaster Recovery Plan, provide a breakdown of the Agency’s critical and non-critical applications:  

CMS Category

Agency Function

Critical Applications Needed to Support Agency Function

1

IEMA must be able to respond to a radiological accident at an Illinois nuclear power plant and provide emergency response guidelines to state and local government agencies

  1. Remote Monitoring System and REAC Support
  2. Mobile Laboratory GENIE System

IEMA must be able to escort shipments of spent nuclear fuel in Illinois.  In addition, the EOC must be able to access the Internet.

  1. Internet Web Access

IEMA must be able to perform radiological inspections to support cleanup activities, decommissioning projects, and areas involved with an accidental nuclear material spill to the environment

  1. West Chicago GENIE System
  2. ArcInfo Geographical Information System (GIS)

IEMA must be able to identify and license the individuals and facilities where radioactive materials are stored and handled.

  1. Radioactive Materials Licensing and Inspection Database

2

None

None

Application Restoration Priorities

Based on the critical application assessments, applications that exist at a given facility were noted and placed in either a Critical or Non-Critical category.  The restoration process is designed to restore Critical applications first, followed by any remaining Non-Critical applications, if possible.  The tables below outline the predominate applications that are active at the two main Agency facilities.  

Facility Name

Application

Internal
Criticality Level

Adams Street

EM2000

Remote Monitoring System

Dispatch Center Access to RMS

REAC Center Access to RMS

Local Area Network

Internet Web Access
Database Access
Remote Access/Dial-in Capabilities
Electronic Mail

Internet Mail Access

Intranet Web Server Access

Publishing/Communications

Document Imaging
SQL Development

Critical

Critical

Critical

Critical

Critical

Critical

Critical

Critical
Critical
Critical

Non-Critical

Non-Critical
Non-Critical
Non-Critical

Outer Park

Remote Monitoring System

REAC Center Access to RMS

Local Area Network

Internet Web Access
Database Access
Remote Access/Dial-in Capabilities
Electronic Mail

Internet Mail Access

Intranet Web Server Access

Publishing/Communications

Document Imaging
SQL Development

Critical

Critical

Critical

Critical

Critical

Critical
Critical
Critical

Non-Critical

Non-Critical
Non-Critical
Non-Critical

...read more.

Conclusion

Business Continuity Disclosure Statement:

The Illinois Emergency Management Agency (IEMA) supports several systems that are critical to the safety of the citizens of Illinois.  To ensure the delivery of critical services supported by those systems, IEMA utilizes a comprehensive approach to continuity planning, an approach that increases the survivability and fault tolerance of those critical systems.  In the event of a disaster that limits our current capabilities, we have plans in place to restore operations quickly and efficiently.  These plans are “living documents” and thus are evaluated constantly and updated according to an established schedule.  


REFERENCES & ENDNOTES

  • Mission-Critical Network Planning, Matthew Liotine, 2003
  • IDS 594 Business Continuity Planning, Instructor Dr. Matthew Liotine
  • Illinois Emergency Management Agency, Systems Documentation
  • IEMA Disaster Recovery Plan, William M. Waggoner, IEMA
  • Special Thanks to Steve Ellis, IEMA Networks, IT Guru

[1]From SFY05 State Budget Book:

The state spends over $640 million annually on technology, including personnel, infrastructure and contractual services.  The state’s information technology function is highly decentralized, with most IT decisions made independently with little consistency or synergy among agencies. The consequence is a duplication of investments between agencies and higher technology costs. In addition to developing critical IT standards for the state, the IT initiative has achieved substantial savings through a series of renegotiations and reductions. For example, CMS achieved a 20 percent reduction in the cost of Centrex telephone lines, a 45 percent reduction in the cost of selected wireless services, and a 20 percent reduction in the number of IT contractors working with state agencies.

Information Technology Initiative Savings

FY2004-FY2006i

FY2004 FY2005 FY2006

Gross Savings         $35,000,000         $70,600,000         $127,000,000

Investment         $14,400,000         $20,000,000         $ 10,000,000

Net Savings         $20,600,000         $50,600,000         $117,000,000

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. This research is about Management of network operating system at Natural Forest Resources management ...

    Secondly, I owe to thanks my friends Shagina Isack, Meyasi Anzameni and Deogratius Mosha for their supports and advise about the study. Thirdly I would like to thank my friends, who kept encouraging me to struggle on despite my complaints about some difficulties.

  2. Computer Networks Architectures & Protocols

    A peer-to-peer network allows two or more PCs to pool their resources together. Individual resources like disk drives, CD-ROM drives, and even printers are transformed into shared, collective resources that are accessible from every PC. Unlike client-server networks, where network information is stored on a centralized file server PC and

  1. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    One option should fulfil all the basic requirements, while another must fulfil all the main requirements, and then another with extra features. After presenting these options to the customer, and selection of the best one, we move on the next stage.

  2. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    Cisco has also been known to buy a customer's old networking equipment to replace it with Cisco's, knowing that they will benefit from the follow-up revenue in the future. Specifically large telecommunications customers like Verizon or SBC have a lot of bargaining power due to the size of their purchases.

  1. Research into standards and standardisation in modern communication networks and their implications and applications

    The standards making process should respect some basic requirements: openness, transparency, consensus and participation of all interested parties. If regulatory authorities decide to make recourse to international standards it is important that they can make use of standards from standards bodies which can be held accountable for establishing consensus between all national positions and interested parties.

  2. Knowledge Management

    Increasingly more knowledge is created like a spiral as the exchange of tacit to explicit knowledge is undertaken at higher and higher levels of the organisation. The spiral becomes larger as it moves through the levels. It can expand horizontally and vertically across other organisations.

  1. Database Systems modules and course work

    table GROUPA5Tutor INSERT INTO GROUPA5Tutor VALUES('AA123','Andrew','Anders','020-89115001','MSc','25-Apr-1999',''); INSERT INTO GROUPA5Tutor VALUES('BB456','Belinda','Brown','020-89111234','BA','02-Jun-2002',''); INSERT INTO GROUPA5Tutor VALUES('CC789','Cathy','Cane','020-89113456','MBA','31-Mar-2004','BB456'); INSERT INTO GROUPA5Tutor VALUES('JH246','James','Harding','020-79115555','MSc','01-Dec-1996',''); INSERT INTO GROUPA5Tutor VALUES('MP135','Marie','Powell','020-79115488','PhD','11-Mar-1997','JH246'); INSERT INTO GROUPA5Tutor VALUES('LK654','Andy','William','020-09785632','MSc','08-Jul-1978',''); INSERT INTO GROUPA5Tutor VALUES('UL509','Sardor','Mohamed','020-94783629','BA','19-Feb-1986','LK654'); INSERT INTO GROUPA5Tutor VALUES('QR868','Mujeeb','Refath','020-93028766','MSc','16-Sep-1996',''); INSERT INTO GROUPA5Tutor VALUES('QR301','Jebez','Solomon','020-98148734','BA','10-Oct-1984','UL509'); INSERT INTO GROUPA5Tutor VALUES('FY678','Malathy','Muruhaiya','020-87239812','PhD','27-Nov-1987',''); COMMIT; Insert statements for table GROUPA5Classroom INSERT INTO

  2. individual project

    2.3 How does the technology work? There are many types of smart cards, used for different purposes. However there is two different genres of smart cards. One is the traditional 'contact' smart card and the other is the 'contact less' smart card. The latter was invented by Dr Arimura in 1978, after pioneering the original smart card (contact)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work