Anthony James Wolf
May 17, 2015
This week’s assignment requires to analyze two different businesses, XYZ computers and 123 textiles corporations, and create a disaster plan for one of the above companies and recommend a backup plan for the selected company’s data. After examining both companies, I choose to create a disaster and data backup plan for company A, XYZ computers. One reason I choose company a is because I live in the southern part of the United States, and am very familiar with the damage a flood can cause.
One of the things that stood out to me about XYZ computers is that their no firewall in place, so all of the company’s 10,000 employee’s data is at serious risk, as well as their customer’s data. Protecting the data of XYZ computers includes keeping it secure at all times, whether in storage or full operation. When examining appendix g, I see that there was a flood that caused extensive damage to the servers, also on the first floor. In order to prevent this from happening again, which is likely in their location is the south, the first recommendation in my disaster plan is to elevate the equipment from the floor or move it to a higher floor. I would also recommend having the pipes inspected to ensure there are no more dangers of pipes bursting due to flooding. I would also recommend running the cables in cable management racks and be routed to the necessary equipment.
In order to keep the equipment powered up in the event of a power outage I would recommend two sources of power to each component. The main power distribution unit normally has a battery backup that would keep the equipment powered up. I would have a second power distribution unit, on a different power source wired to power the equipment instead of the backup power unit. This could be done using a generator, or you could tie the generator directly into the main power distribution unit, which may actually be easier, but all three would require regular testing and maintenance.
In order to meet the requirements of a RAID system of data protection, there a mirrored set of servers, components and power feeds to all the equipment. All disks should have a mirrored double as well. For example the disks or servers that serves the it department should have a mirrored server. This can be done using a RAID 2 scenario, where disk 1b mirrors disk 1a, disk 2b mirrors 2a and so forth and so on. You would need double the anticipated server capacity to do this. It is possible to configure RAID disks according to the size of the files being stored. If the amount of data per file is about the same, and the file is not very big, the disk sectors can be configured for a certain type of file size. This can help to improve the time it takes a server of the computer takes in allocating file location, reading the disk itself and pulling it up for the requesting device.
The physical layer of the equipment should be fairly safe in the environment and everything is physically where it should be. Now I will examine the data link and network layer of XYZ computers. The first thing I would is to assign a level of access and for all workstations on the network. The reason I would do this first is to avoid confusion when reassigning settings on the network and minimizing downtime as much as possible. It is easier to determine which workgroups need what access once the nodes in the network are grouped together. It is critical to limit internet access to only the nodes or workgroups that need it due to security risk existing on the internet. In order to assign network regulations it is important to know the needs of each node and establish tier levels, and which nodes fall under each tier. Some workgroups will only require access to two database, or communicates with other workgroups internally. This allows for the best network performance by limiting broadcast traffic and helps keep the network secure by