Briefing Memorandum
1.0 Introduction
Data recovery plan is extremely influential in any business environment because it ensures the continuity of the business during or after any attack to the information system. There are various technology solutions that can be used to ensure data integrity, confidentiality and availability of information within the information system. This presentation limits the discussion on cloud computing, data back-up solutions and General disaster recovery/business continuity plan Services such as provision of access controls. The presentation takes the following summary order.
2.0 Cloud-based back-up solution
Cloud based backup technology solution is most appropriate for ensuring business continuity. This technology is appropriate because business ventures are guaranteed of security for their information systems data which is left on the hands of the experts. This solution is also relatively cheap in terms of cost as users or business ventures pays only for the services they use. Disaster recovery in this case is also extraordinarily efficient as it can be done within the shortest response time such as few minutes. The technology employs data recovery as a service (DRaaS) to, effectively, recover data during disasters or any attack to information system (Lamson et al., 2013).
3.0 Data recovery planning and testing
Next is data recovery plan solution. This is the most significant technology solution. This is because any solution method planned may not work effectively without considerable planning in advance prior to implementation. The ultimate goal is to have a back-up system that is ready to take over within the shortest reasonable time, say, in seconds if not milliseconds. Characteristically, a surplus system ought to be situated far from the primary data center which is several miles away if achievable. The advancing steps in the direction of such a goal comprise of employing modern digital tape like LTO, or linear tape-open for the purpose of storing astronomical data records. These kinds of steps sustain the eventual goal of a, completely, redundant location for data/ information backup (Potts & Thomson, 2013).
4.0 General disaster recovery: Access control
The third technology solution is access control, which takes the form of identification, authentication and finally authorization. Identification is a declaration of what somebody is or what something is. The system is expected to accept the user name identification if it is valid, else it is rejected. Authentication is the act of confirming a declaration made by the individual. For instance, by supplying the right password information, the user is giving proof that he/she is the person that the belongs. After successful identification and authentication, by a person, program or computer,then it has to be resolved. The resolution will state the information resources that one is allowed to access and what dealings or operations you will be permitted to carry out such as viewing, creating, deleting, changing and many more). This is referred to as authorization (Rittinghouse, Ransome & CISM, 2011).
References
CSC (2013). Business Continuity Management and Disaster Recovery. Retrieved on 3rd June 2014, from
http://www.csc.com/cybersecurity/offerings/45397/86285-business_continuity_disaster_recovery
Phil Colpas.(2013). Disaster recovery solutions underscore the importance of security. Retrieved on 3rd June 2014, from http://www.healthmgttech.com/articles/201305/disaster-recovery-solutions-underscore-the-importance-of-security.php
Pete Lamson, SVP, Carbonite, Cristine Kao, Carestream, David Kidd & Jaclyn Mispagel, Windstream.(2013). Disaster recovery solutions underscore the importance of security.Retrieved on 3rd June 2014, from
http://www.healthmgttech.com/articles/201305/disaster-recovery-solutions-underscore-the-importance-of-security.php
Jarrett Potts, Nathan Thompson. (2013). Disaster recovery solutions underscore the importance of security. Retrieved on 3rd June 2014, from
http://www.healthmgttech.com/articles/201305/disaster-recovery-solutions-underscore-the-importance-of-security.php
Rittinghouse, J., Ransome, J. F., & CISM, C. (2011). Business continuity and disaster recovery for infosec managers. Digital Press