Site icon Eminence Papers

Continuity and Disaster Recovery

Continuity and Disaster Recovery

Business Continuity and Disaster Recovery Plan Strategy for Creech Air Force Base

Because of how much Creech Air Base depends on technology for most of its technological needs, there is a need to have a business continuity plan. With such a plan, it will be possible to ensure there is a restoration of normal operations almost immediately after an incident that threatened to disrupt the Air Base operations. For the organization to be vigilant or ensure efficient business continuity, everybody must be computer conscious and not just the IT department.

In continuity, duplicate systems need to be designed and rolled out. If a disaster happens and the main system is compromised, the duplicate system can kick in and process the normal operations while the main system is restored. The use of duplicate systems makes sense because the information that passes through the second system is always current and real-time (Death, 2017). These systems can also be used to run non-critical processes as well as the necessary test programs. Nevertheless, the organization will have to incur heavy monetary expenses to keep these systems running.

To recover data systems, one needs to recognize the organization’s critical applications and prioritize the order in which they will be restored. The operating systems and applications that have many dependents should be restored first. By identifying these programs, it becomes easy to identify where they reside and recover them (Snedaker, & Rima, 2013). Servers that are on the same network as the failed one or one with excess capacity should be used in the rescue. This way, the failure does not remain that way for long. There must also be some preconfigured, spare servers, and storage that will be called upon when the main fails.

A disaster recovery strategy that would work perfectly for the Creech Airbase is making it hard for cybercriminals to access the information that is handled by the system. By walling data sets and applications off from each other, it becomes difficult for any unauthorized individual to get all three copies simultaneously (Death, 2017). For one, the 3,2,1 strategy involves having three copies of data and only storing two locally and the third one offsite. This way, even if one gets access to the two files, they would still need the third to decrypt the message and get the information they need. This strategy also involves constant monitoring and encryption, making it harder to access the information in question. Eventually, the invader will be discouraged because of the work involved.

Another strategy that would also be effective involves recognizing the attack and reconstructing these targets. This strategy depends on the constant analysis of the traffic, and comparing the results with the set patterns and activity. The system then cuts off any abnormal activity in this network by itself, and when it cannot, it alerts the system administrator (Rittinghouse, & Ransome, 2005). This is a strategy that works perfectly as a secondary tactic because of its reactive nature. There is also a possibility that the strategy might not be able to detect some forms of attacks.

Business continuity and disaster recovery are important aspects of cybersecurity that should be carefully managed. In the case of an Air Base like Creech, there is a need for systems such as weapon control or communications to continue working effectively even in the light of a disabling attack. Doing this requires using a strategy such as duplicate systems, which ensures that the main system’s failure does not mean business operations also fail. Disaster recovery also works with strategies such as storing pieces of information in different locations, encrypted and well-monitored to discourage attackers.

References

Death, D. (2017). Information Security Handbook. Packt Publishing.

Rittinghouse, J. W., & Ransome, J. F. (2005). Business continuity and disaster recovery for infosec managers. Amsterdam: Elsevier Digital Press.

Snedaker, S., & Rima, C. (2013). Business continuity and disaster recovery planning for IT professionals.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Week 5 Assignment 

Instructions

Continuity and Disaster Recovery

Utilizing your comprehensive security plan outline as a guide, develop the business continuity and disaster recovery plan strategy for the organization.

Use the outline attached as a guide to understand the idea of where this plan will be utilized, new items can be added that are not part of that outline is ok. As long as it still falls under the Idea of this project been to the Logistics section of a Creech Air Force Base.

Exit mobile version