Backup and recovery policy document

Assignment Help Basic Computer Science
Reference no: EM132537953

Gold Hammer Construction Ltd., Vancouver, British Columbia

Gold Hammer Construction Ltd. is a prominent construction company that operates across Western Canada. It has a head office in Vancouver, BC with several offices in other major cities. The company mainly focuses on industrial and commercial construction projects such as the construction of control buildings, warehouses, office buildings, power centres and retail store fronts. As of January 2020, the company consists of 6000 employees with the bulk of the employee force being construction workers. The company also has 100 security personnel outsourced from Silver Nail Security Pvt. Ltd. The company's IT hierarchy is as follows:

· Chief Information Officer

· Chief Technology Officer

· Chief Information Security Officer

· IT Operations

o IT Development

o Information Network Specialist

o Information Security Specialist

o IT Operations

o IT Support

· IT Helpdesk

Gold Hammer Construction Ltd. gets its raw materials from various suppliers across the country, as the progress of projects should not be impeded by a lack of raw materials. The company has client, financial and employee data stored on cloud servers and in a large data centre in Calgary, Alberta. There is also Client Support System which connects workstations, mobile devices and tablets to the company network across different departments using WAN, LAN, MAN, WIFI & Internet.

The various departments and services are as follows:

1. Project Procurement

2. Construction Site Management

3. Project Management

4. Administration

5. Human Resources

6. Finance

7. Information Technology

8. Customer Service (Information and payments)

Backup and Recovery Lab Assignment. 1. You will install Server 2016 in a virtual machine (either Virtualbox or VMware are fine). 2. You will configure, learn, and explore VSS (VSS (Volume Shadow Copy Service. The team deliverable for this lab is a Backup and Recovery Policy document for your assigned organization (GOLD Hammer Construction- Faux Company). Use your judgement as to what will work best for your organization. Search out backup and recovery policies on the internet to gain insight and ideas but do not just copy them. 7. Your Backup and Recovery Policy must address using VSS and WSB in your organization. 8. Your Backup and Recovery Policy document must address at minimum all of the following topic: • What is the purpose of the backup policy: this identifies the goal of the policy and why it is important. This includes a policy statement, background, object, scope, definitions, guiding principles, etc. • Who is responsible for backups: What person(s), position, or department is responsible for ensuring the policy and procedures are followed. What are the roles and responsibilities? Who is responsible for backing up the data? who is responsible for restoring data? who is responsible for securing the backed-up data? who is responsible for erasing or destroying it? • Data to be backed up: This identifies what data management determines is important to the organization. • Off site backups: A copy of a backup should be stored at a separate location. This helps protect the data in the event of fire, flood or other disasters that can destroy the primary site. • Label media: Media labeling identifies what data is on the media and when the backup to that location was performed. • Testing: the policy needs to identify when and at what level testing should be performed and how the results are recorded. • Retention requirements: retention determines how many tapes or other media must be purchased and for how long they will be retained before being destroyed. The length of retention is determined by laws, regulations, and industry guidelines as well as organizational needs. • Execution and frequency of backups: The BIA influences the execution and frequency by identifying RTO (recovery time objectives) and RPO (recovery point objectives). The helps determine the type of back performed and the rotation strategy employed. What is the plan? the schedule? • Protecting backups: Backup media needs to be classified and handled the same as the original data. A breach that compromises the back data is the same as a breach that compromises the original data. The policy needs to identify the backups are to be protected. What measures must be followed to ensure the security of your organizations' backups? • Disposing of media: How, when, where, and by whom media will be sanitized or destroyed must be specified in the policy.

Reference no: EM132537953

Questions Cloud

Problem solving with data analytics : Discuss the costs and benefits of the example you have chosen, and whether or not you think the data analytics effort was worthwhile for the organization.
What is the present value of the note receivable at June : The market rate of interest on similar notes is 7%. The full amount of the note is due at maturity on November 30, 20X7. What is the present value of the note
Communicate the project performance : Identify the top three EVM metrics you will use to communicate the project performance.
Calculate the intrinsic value using the multistage model : Assume that over the next three years dividends will grow as follows, 5% next year,Calculate the intrinsic value using the multistage model.
Backup and recovery policy document : Gold Hammer Construction Ltd. is a prominent construction company that operates across Western Canada.
Explain the recognition criteria of deferred tax assets : Briefly explain the concepts of temporary difference and permanent difference in accouting. Explain the recognition criteria of deferred tax assets
What will be the effect on net income : Coronado has sufficient unused capacity to produce the 1800 scales. If the special order is accepted, what will be the effect on net income
What should the unit price be : Link has received a special order from a foreign company for 5,000 units. If Link wants to earn $9,000 on the order, what should the unit price be
Computer forensics investigative process : The computer forensics investigative process includes five steps: Identification, Preservation, Collection, Examination, and Presentation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd