Precautionary Measures for Disaster Recovery
Disaster recovery plans is defined as the preventive measure which can help contemporary business organizations to stop any probable cybersecurity concerns such as malware infection and phishing emails (Jagadish et al., 2019). Standardized communication is much significant for the creation of disaster recovery plans as it can help in creating awareness among employees.
The prime purpose of this network disaster recovery plan is to create a portfolio for Commonwealth Bank of Australia which is a multinational bank located in Australia. The precautions required for different types of network outages can be determined from this portfolio (Bahmani, & Zhang, 2021). From the breaches of data security to natural disaster there should be a plan, as not having a disaster recovery plan can put the banking data at risk of reputation loss, high financial loss as well as even huge risks for the consumers and other clients. In this report a network topology diagram will be created for Commonwealth Bank of Australia as well as the pre cautions and post planning for the bank will be also discussed.
Informing the incident to the Internet Service Provider is the initial step which needs to be selected during a sudden internet outage (Becker, Hohlfeld & Smaragdakis, 2021). At the same time, it is the responsibility of the network engineers of this banking organization to troubleshot the problem so that the exact reason behind the internet outage can be identified.
Entire connectivity of the business setting must be disrupted if malware virus infected the network. Disconnection can help in restricting the spread of this infection from one segment of the network to another. All the critical systems of the business must run in safe mode and employees of the organization must be logging out of their employee accounts so that their regular business operations are not disrupted. After that, networking engineers must be looking forward to detect suspicious activities on the network (Shao et al., 2020). The nature of the infection needs to be scanned in such modus so that each minute details of the infection such as its location in the organizational network can be evaluated.
Event viewer can help this banking organization to identify if there is a hardware failure in the network or not. This Windows memory diagnostic tool can help in identifying the reason beheld frequent crashing of the organizational network as well (Zhang et al., 2018). Corrupt data files and other areas of the network which needs to be repaired can be done by Event Viewer.
As the entire work in the bank will be depended on the internet connection so there should be two different operators always, and both the connection should be working, so that if one will stop working another one can be used at the same time, also the bank can think of WAN based connection so that there cannot be any issue of wire cutting.
For the cases of power outage the organisation can use an electric inverted or solar panel based inverter so that the possibility of power outage can be less.
Network Topology Diagram
For preventing the password security breach, the bank can implement a possession based MFA or 2FA which needs the user to present pieces of evidences successfully in the form of certain procession such as USB key (Gschwender and Gillard, 2017). Along with that there should be a biometric authentication like finger print so that the systems can be secured from the hackers,
(Figure: Network topology diagram) – Created by Author
The pre-cautions for the disaster recovery are given as follows:
- Install surge protectors & uninterruptible power supplies – the UPS can provide the user enough time and battery life to save the data in the event of power disruption. Check to make sure that the UPS size and type meets the company’s requirements and standards. All the networked and computer device should be plugged through a UPS (Platt, 2017). Also, the standard surge protectors should suffice for non-networked equipment and less-sensitive electronics. As recommended by the manufacture, be sure to replace and test the UPS.
- Take data back up regularly – For the security of data, the confidential and important information of the bank will be needed to be backed up on a cloud server like AWS so that if any kind of data breach will happen, then the data can be recovered from there very quickly (Jamali et al., 2019).
- Install & activate software and hardware firewalls –the firewalls can stop the employees and thwart malicious hackers from browsing the inappropriate website. Update and install the firewall systems on all the employee’s smartphone, computer and networked device. Even if the user uses a VPN or CSP, it’s included the off-site employees (Chandra & Paras, 2021). The user may also want to install the IDPS to give a good level of protection.
The post planning for the disaster recovery is given as follows:
If any kind of disaster will happen in the organization, then the data will be needed to be recovered from the cloud storage as they are safe. The customers will be needed to provide alters that a breach has been happened to the bank and they should not share any kind of information with anyone without having a communication with the Bank (Alawanthan, Dorasamy & Raman, 2017). The systems should be harden again and a through analysis will be needed to be performed so that the system can be made a unbreakable for the hackers.
The questions that can be asked by the clients are:
- What data is mission critical for the Bank?
- What are the constraints of physical facility?
- What are the biggest vulnerabilities for the data?
- How to disaster recovery plan will react when any unusual incident will occur?
Task Name |
Duration |
Start |
Finish |
Disaster Recovery Plan Implementation |
90 days |
Mon 5/2/22 |
Fri 9/2/22 |
Project initiation phase |
10 days |
Mon 5/2/22 |
Fri 5/13/22 |
Identification of problem |
2 days |
Mon 5/2/22 |
Tue 5/3/22 |
Business case development |
3 days |
Wed 5/4/22 |
Fri 5/6/22 |
Cost benefit analysis |
2 days |
Mon 5/9/22 |
Tue 5/10/22 |
Development of charter for the disaster recovery plan |
2 days |
Wed 5/11/22 |
Thu 5/12/22 |
Authorization of Program |
1 day |
Fri 5/13/22 |
Fri 5/13/22 |
Project planning phase |
11 days |
Mon 5/16/22 |
Mon 5/30/22 |
Elaboration of scope statement |
3 days |
Mon 5/16/22 |
Wed 5/18/22 |
Identification of objectives along with the outcomes |
1 day |
Thu 5/19/22 |
Thu 5/19/22 |
Estimating budget |
3 days |
Fri 5/20/22 |
Tue 5/24/22 |
Hiring team members |
2 days |
Wed 5/25/22 |
Thu 5/26/22 |
Risk management |
2 days |
Fri 5/27/22 |
Mon 5/30/22 |
Project execution phase |
63 days |
Tue 5/31/22 |
Thu 8/25/22 |
Program design |
7 days |
Tue 5/31/22 |
Wed 6/8/22 |
Integration of Policy |
12 days |
Thu 6/9/22 |
Fri 6/24/22 |
Disaster Recovery Plan validation |
5 days |
Mon 6/27/22 |
Fri 7/1/22 |
Developing revised Policy |
5 days |
Mon 7/4/22 |
Fri 7/8/22 |
Analysis of the redial gaps |
6 days |
Mon 7/11/22 |
Mon 7/18/22 |
Secure communication links. |
7 days |
Tue 7/19/22 |
Wed 7/27/22 |
Implementation of Disaster Recovery Plan |
5 days |
Thu 7/28/22 |
Wed 8/3/22 |
Testing |
10 days |
Thu 8/4/22 |
Wed 8/17/22 |
Training |
6 days |
Thu 8/18/22 |
Thu 8/25/22 |
Project monitoring phase |
2 days |
Fri 8/26/22 |
Mon 8/29/22 |
Progress and Reporting |
1 day |
Fri 8/26/22 |
Fri 8/26/22 |
Conducting Regular meeting |
1 day |
Mon 8/29/22 |
Mon 8/29/22 |
Project closure phase |
4 days |
Tue 8/30/22 |
Fri 9/2/22 |
Post project review |
2 days |
Tue 8/30/22 |
Wed 8/31/22 |
Sign off as well as documentation |
1 day |
Thu 9/1/22 |
Thu 9/1/22 |
Evaluation of success of the project |
1 day |
Thu 9/1/22 |
Thu 9/1/22 |
Releasing all the resources |
1 day |
Fri 9/2/22 |
Fri 9/2/22 |
Conclusion
The prime purpose of this portfolio was to help Commonwealth Bank of Australia to identify the steps required which can help this banking organization to address different types of networking threats. Troubleshooting the network is the decisive step required to deal with sudden internet outage, disconnecting entire organizational network and running all critical system in safe mode are the steps required to deal with malware infection. From this portfolio, it can be concluded that Event viewer can help this banking organization to detect hardware failures. It can be stated that the disaster recovery plan will represent the procedures and processes for making recovery of the technology infrastructure included document management system as well as for the core system and network.
References
Alawanthan, D., Dorasamy, M., & Raman, M. (2017, July). Information Technology Disaster Recovery process improvement in organization. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE.
Bahmani, H., & Zhang, W. (2021). Comprehensive Success Evaluation Framework for Socio-Natural Disaster Recovery Projects. Buildings, 11(12), 647.
Becker, L., Hohlfeld, O., & Smaragdakis, G. (2021, December). Large scale outage visibility on the control plane. In Proceedings of the CoNEXT Student Workshop (pp. 13-14). https://dl.acm.org/doi/pdf/10.1145/3488658.3493788
Chandra, Y., & Paras, A. (2021). Social entrepreneurship in the context of disaster recovery: Organizing for public value creation. Public Management Review, 23(12), 1856-1877.
Gschwender, A.N. and Gillard, L., 2017. Disaster preparedness in the blood bank. American Society for Clinical Laboratory Science, 30(4), pp.250-257.
Jagadish, G., Jaswanth, L., Sowjanya, K., Harsha, P. S., & Kumar, M. N. (2019). A novel prototype to secure network using malware detection framework against malware attack in wireless network.
Jamali, M., Nejat, A., Ghosh, S., Jin, F., & Cao, G. (2019). Social media data and post-disaster recovery. International Journal of Information Management, 44, 25-37.
Platt, S. (2017, June). Factors affecting the speed and quality of post-disaster recovery and resilience. In International Conference on Earthquake Engineering and Structural Dynamics (pp. 369-403). Springer, Cham.
Shao, H., Xia, M., Han, G., Zhang, Y., & Wan, J. (2020). Intelligent fault diagnosis of rotor-bearing system under varying working conditions with modified transfer convolutional neural network and thermal images. IEEE Transactions on Industrial Informatics, 17(5), 3488-3496. https://eprints.lancs.ac.uk/id/eprint/149667/1/Manuscript_3_20200513.pdf
Zhang, Z., Mehmood, A., Shu, L., Huo, Z., Zhang, Y., & Mukherjee, M. (2018). A survey on fault diagnosis in wireless sensor networks. IEEE Access, 6, 11349-11364. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8283753
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2022). Essay: Disaster Recovery Plans For Commonwealth Bank Of Australia." (61 Characters). Retrieved from https://myassignmenthelp.com/free-samples/mis102-data-and-networking/about-the-network-design-file-A1E7A47.html.
"Essay: Disaster Recovery Plans For Commonwealth Bank Of Australia." (61 Characters)." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/mis102-data-and-networking/about-the-network-design-file-A1E7A47.html.
My Assignment Help (2022) Essay: Disaster Recovery Plans For Commonwealth Bank Of Australia." (61 Characters) [Online]. Available from: https://myassignmenthelp.com/free-samples/mis102-data-and-networking/about-the-network-design-file-A1E7A47.html
[Accessed 19 August 2024].
My Assignment Help. 'Essay: Disaster Recovery Plans For Commonwealth Bank Of Australia." (61 Characters)' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/mis102-data-and-networking/about-the-network-design-file-A1E7A47.html> accessed 19 August 2024.
My Assignment Help. Essay: Disaster Recovery Plans For Commonwealth Bank Of Australia." (61 Characters) [Internet]. My Assignment Help. 2022 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/mis102-data-and-networking/about-the-network-design-file-A1E7A47.html.