Contingency Planning for DR Alarms

Home
breadCrumb image
Contingency Planning for DR Alarms









Assessment item 4 –

Contingency Planning







List of figures:

Figure 1: cloud storage 17

List of tables:

Table 1: Backup schedule 18

Table 2: Data retention 19

Table 3: Action plan table 20

Table 4: Roles and Responsibilities 23

Table 5: Communication plan 25

Table 6: Action Plan 25

Introduction

DR alarms has been facing some cyber-attack issues. It is concerned about the potential losses of designing new IoT monitoring devices. This report shows the implementation process of BCP at DR alarms as per the concern of engineering manager. In this report a proposal will developed for business continuity plan (BCP) in DR Alarms. Needs for the business continuity plan are discussed in this report. The contingency plan should include the recovery time of 2 hours and recovery point objective of 4 hour. In this report best solutions are discussed through BCP and disaster recovery proposal as DR Alarms have not any policy regarded disaster recovery plan. A proposal will be developed for incident response plan, a back plan and a disaster recovery plan. BCP proposal has beinten included theirs needs, business impact, incident response, backup and disaster recovery. A justification is given for risk management and assess IT risks in the term of business. Risk management approaches are discussed to compare and contrast the advantages of each approach. These approaches will help to risk mitigation in the DR alarms. BCP will help to outline all the potential impact in any disaster situation and helps in quick business recovery to do usual function.



Business continuity plan

  1. Need of BCP in DR alarms

Business continuity plan is a process which involve the creation of presentation and recovery of system from potential threats of company. This plan ensures a personal and asset of protection that are able to quick function in a disaster situation. A BCP plan as a general conceive that involve inputs which is belongs to stakeholders (Phillips & Tanner, 2019).

Business continuity plan defines all the risks that could affect the DR alarm’s operations, which makes important part of DR alarm’s risk management strategies. These risks can include natural disasters like flood, fire or other relevant events and cyber-attacks. After identifying these risk BCP will include-

  • Determination of how cyber-attacks will affect operations in DR alarms.

  • Implementation of safeguards and mitigation procedure of risks in DR alarms.

  • Testing procedure for data backup to ensure they work.

  • Recheck the whole process to ensure it is up to date (AlDairi, 2017).

BCP is an important part for DR alarms. If any disruptions and threats are occurring in DR alarms then it means losses of revenue and high costs will affect the portability (Ahmadian et al., 2020).

To know business failure

BCP has required by DR alarms to mitigate the effects of hard market which has never been predicted. This plan provides surety for business recovery in a fast process and help to remove major downtimes in the ongoing projects of DR alarms.

Losses incurred

In downtime of DR alarms, it may become tough to raise marketing trends in business. To prevent these type of losses BCP can help in the downtime. It gives a backup plan, in case business faces some difficulties. If any business plan is required, it prevents from more losses and boots in the business. It allows to breaking in a considering if situation is stabilized (Kure, Islam, & Razzaque, 2018).

Anticipate catastrophes

Natural disaster may happen in anytime, there is no limit for that. There are variety of problems that occurs in nature which may strike DR alarms and cripple it. In this time, DR alarms can face a myriad of problems in software or hardware hacking to destroy mechanisms in DR alarms. It aims of destruction of material remuneration and pride. To prevent these difficulties, it is required to engage the disaster planning which measures the implementation of assist in business (Niemimaa et al., 2019).

Recovery from malware attacks and different viruses

In some cases, if DR alarms exposes their business in basis of huge customers, competition always occurs and then difficult one would be lead in malicious behavior. So, on that time business contingency plans will ensure that DR alarms can recover their lost data or can segment their information, even if there is a case of crippling threat. This plan has backup solutions to recover threats of malwares which may have made business losses in millions.

Customer protection

One of the most valuable assets is customer protection, DR alarms have to protect their customers when it’s time to visit business premise or after they leave premise. At the time of leave, customer will have to leave their information. Customer should have safeguarded that data to save the information from falling in wrong hands. At these times contingency plan would help to the customer in case they are facing any threat in DR alarms.

Enhancement of competitive spirit

In case there is any general attack in the DR alarms space, authority can have control power and managing power in their hands as per concern customer’s needs. It is considered that all customer wants a secure and stable business, so in case they want any assurance against to protect the data, they will show more interest in DR alarms.

To maintain employee determination

It is the matter of the customer’s comfort with their decision for the management, they would show more interest in achieving the objectives. Once the employee has assurance of their safety in availability of the contingency plan, they will have more determination and enthusiasm for their work. So, the overall result will help to improve the productivity at DR alarms (Rezaei Soufi, Torabi, & Sahebjamnia, 2019).

Provide better communication

Communication is considered as pillar of any organization including the success of that business. It considered as the growth of the organization as well as it will become the growth of DR alarms. An effective plan in DR alarms will ensure the employee that they are directly effective on their performance during the time of crisis.

Enhance company reputation

Effective planning ensures all the employees that they are well informed about all fronts of their behavior and reactions. By these planning customers will able to depend on DR alarms for the suitability of managing situation in effective manners (Hamid, 2018).

Benefits of business continuity plan

  • Keep the business on trading in time of incident

  • Operation recovering fast after any interruption

  • Cost reducing in time of disruption

  • Risk mitigation

  • Financial exposure

  • Company reputation in safe guard

  • Customer confidence building (Rezaei Soufi, Torabi, & Sahebjamnia, 2019).

Purpose

To find potential risks in various sectors including information system failure and hacking events.

To create prevention and recovery systems of DR alarms from different threats and natural disaster on cyber-attacks.

To protect asset and personnel to make sure quick functionality and disaster strikes.

To ensure that there are no weaknesses which is to be identified and corrected (Phillips & Tanner, 2019).

Scope

Business continuity plan must include the protection of assets of firms and their customers who will capable for provide to resume the effective operations at the level and in the specific time period. It allows to meet it as legal and regulate requirements.

  1. Business impact analysis for DR alarms

Purpose

To predict all the consequences in disruption for business functions and other related functions. To gather needed information for development of recovery strategies. Losses prevention in any situation or in disaster condition of DR Alarms which should be identified in the period of risk assessment.

Scope

Business impact analysis used identifies all the activities associated with sensitive time and sensitive resources. It helps to estimate the impact which has related to DR alarm’s services and products.

Business impact analysis

Business impact analysis included in systematic process which determines and evaluates potential effects in any interruption of critical operations of any business, considered is as a result of any disaster or any accident or an emergency. Business impact plan has included in essential element of DR Alarm’s business continuity plan.

A business impact analysis helps to predict all the consequences in disruption in DR alarm’s various functions and processes. It helps to gather information that are needed for development of recovery strategies. It would take cares of potential scenarios losses identification of a risk assessment (Rezaei Soufi, Torabi, & Sahebjamnia, 2019).

It is a process for determining criticality of a business functionality and related resources that are required to ensure the operational resilience or operation continuity during any disruption. It includes five elements-

  • Executive sponsorship

  • Understands the organization

  • Tools for BIA

  • Processes for BIA

  • Findings for BIA

It has exploratory component for the process of revealing any planning component in developing strategies for minimizing risks. A business could spend more than two times as much in marketing in any disaster event, this business impact analysis would help rebuild the customer confidence. It would help in establishing recovery of strategies and requirements of resources and time (AlDairi, 2017).

Application name: risk assessment

Department name: security department

Application description: General Ledger

Participating department personnel: XXX



No.

Application criteria

Criteria description

1.

Cycles

Daily

2.

Volume

Information transection.

3.

Maximum time in business process that could be deferred in a disaster event and recover the system inoperable:

Description of consequences:

In case of inoperable system, ability of accounting process transmission has lost completely.

: Staff members has limited to generate hard copies to data entry preparation.

4.

Alternative method:

Description of alternative method:

Manual process is not a better alternative, there is multiple departments.

: Encryption of cloud backup on personal device.

5.

Number of days in alternative process performance:

Describe consequences:

0

: Data can be encrypted by outer sources.

6.

Other departments impact:

Describe consequences:

Payment and purchasing function that would be restricted in different ways.

: System will become more complex.

7.

Revenue the impact of result in not performing business process which is related to the critical application:

Describe consequences:

Shut down operation, cease all revenue operating.

: Security issues can be raised.



Business Impact Analysis Report

  1. Business Unit Name – BU

  2. Recovery Time Objective – RTO

  3. Recovery Point Objective – RPO

  4. Parent Process Depends On – RP Depends on

  5. Parent Process Required By – PP Required by



BU Name

Head Count

Parent Process

Priority Ranking

RTO

RPO

PP Depends on

PP Required by

DR Alarms

10,000

Network security

Critical

2 hour

4 hour

Security policy

DR Alarms



Sub-Process

Priority Ranking

RTO

RPO

SP Depends on

SP Required by

Quantitative Impact

Cyber security

Critical

2 hour

4 hour

Engineering manager

Business continuity

practices

$46,980





Time Needed to Recover Staff

Qualitative Impact

< 4 hrs

1 day

3 days

1 week

2 weeks

> 2 weeks

Lost data

200

150

125

100

50

40






Technology / Services Recovery Time


Recovery Strategy

< 4 hrs

1 day

3 days

1 week

2 weeks

> 2 weeks

Comments

Cloud Backup

150

125

100

50

40

30

Advances data recovery tool



Benefits of business impact analysis

  • Highest recovery procedures

  • Priority ranking in order of recovery

  • Priority in the business continuity plan

  • Helps in measurement of business continuity plan testing effectiveness

  • Gives a rational approach to backup rotation

  1. A proposal for incident response plan

Cyber-attacks can be prevented in DR alarms by considering it as emphasized anticipation, adaptation and agility in security analysis. With the help of incident response program, cyber-attacks can be mitigated or can be avoided altogether. System engineering and Enterprise architecture should be based on assumption of component which are made to be compromised. In addition, missions and functions of business must be continued to operate even in the presence of these compromises (Kure, Islam, & Razzaque, 2018).

Being protective in DR alarms to better react with deep understanding for threats of actor’s intensions and DR alarms risk related to potential threats.

A cyber security incident response plan includes all the instruction that are designed to help DR Alarms for detecting, responding and recovering it from network security incident. DR plans are the technology-centric and help to address the issues such as malware detection, data theft or any service outages (Mendhurwar, & Mishra, 2019). A cyber-attack can affect DR alarms across function in different ways, this incident response plan should also encompass in other areas like finance, HR, customer services, communications, insurances, local authorities and many other entities (AlDairi, 2017).

The security incident plan should be considered as ongoing basis within a living document including recurring detection and other activities of responses such as threat hunting, cyber-attacks, incident response and other recovery. Performing of the incident response activity, will help in improving IT security hygiene and in protecting DR alarms from the known threats, unknown attackers, data breach prevention (Ahmad et al., 2020).

Purpose

It has purpose of establishing and clearing testing measurement in DR alarms. It also helps to reduce the impacts of any breach in internal or external threats. Incident response plan is considered as part of successful security program.

Scope

Incident response plan is the set of tools and all the procedures that can be helps the security team of DR alarms which will help to identify, recover, eliminate from potential threats of cyber-attacks. It designed for help to quick respond and uniformly in against to the external threats.

Incident Response Team

Each of the following areas will have a primary and alternate member:

  • Information Privacy Office (IPO)

  • Information Security Office (ISO)

  • Network Architecture

  • Information Technology Operations Center (ITOC)

  • Operating System Architecture

Incident Response Team Role and Responsibility

Information Security Office

  • It determines that, which member has Incident Response Team, play an active role for investigation in DR alarms.

  • It determines scope and nature of any incident

  • It contacts for qualified information of security specialist as according to requirement.

  • Contacts for members in Incident Response Team.

  • It monitors for progress of investigation.

  • It provides proper training for incident handling in DR alarms.

  • It escalates to management as in appropriate manner

  • Contacts for auxiliary departments

  • It ensures that evidence gathering, preservation and chain of custody is appropriate

Information Technology Operations Center

  • It provides notifications to chief information security office for activation of incident response team DR alarms.

  • It provides central points of contact for each incident.

Information Privacy Office

  • It assists the appropriate developing communications for impacted parties.

  • It coordinates with activities of Information Security Offices of DR alarms.

  • It provides documents for types of personal information which may be caused for a breach in DR alarms.

  • It assesses the need for changing the privacy policy, practices and procedures as a product of the breach in DR Alarms.

  • It provides guidance of investigation for issues which has related to the privacy of customers and the employee’s personal information in DR alarms.

Network Architecture

  • It takes actions which are necessary for block traffics that are came from suspected intruder.

  • Provides analyzation of network traffic to signs of denial a service which has distributed in denial of service and other external attacks in DR alarms.

  • It looks for signs in a firewall breach.

  • It has runs of tracing tools like sniffers, event loggers and Transmission Controls Protocol (TCP) ports monitors.

  • It has contacts of external Internet service provider in assistance for handling any incident in DR alarms (Ghafur et al., 2019).

Operating System Architecture

  • It examines the system log in critical system of unusual activity in DR alarms.

  • It ensures the service pack and the patch which has currents on the mission-critical computer in DR alarms.

  • It also ensures the backup in place of all critical system.

Benefits for incident response plan

  • Crime prevention.

  • Reduces the investigation costs.

  • Increases confidence of investors and clients

  • Penalty avoidance

  • Targets the security monitoring

  1. Backup plan proposal

Purpose

To reduce the risk in data loss, employee wants backup for their files and other databases, they also want backup in their operating system, applications etc. In case employees using virtualization then they will consider their host as back up and management console backup. If any employee using cloud infrastructure as a service, then employee will include it their scope.

Backup plan for DR alarms

DR alarms wants to back up their critical data in their organization, to make it key component in DR alarm’s disaster recovery plan or business continuity plan. DR alarms and their employees are very dependent on data, it is like a life source for the business, without it they cannot be survive. A company needs the backup plans and disaster recovery plans or other they will not survive in disaster.

Backup strategy

DR Alarms should design a backup plan to handle the whole backup strategy and their solutions and required tools, scope for the backup, their scheduling, infrastructures, storage and network, recovery point objective (RPOs) and recovery time objective (RTOs).

Employees continuously change the data and in case of disaster time, data creates the latest form of backup and at the moment data failure will be lost, this is called recovery point objective, the maximum period for that employee have to lose the data on the system because of the disaster (Genç, 2017).

Shorter RPO demotes less data losing and requires more data backups and strategy capacity. Employee requires more network resources and computing resources to rum the backup. Longer RPO denotes more affordable and more data losing.

4 hours backup needs daily backup in DR alarms. Which requires modern solutions like cyber backup plans that can easily implemented of RPO by an employee in few minutes shorter RPOs will be considered as critical system and longer RPOs considered as secondary system.

Another variable is recovery time objective (RTO); this shows the speed of data recovering at the time of disaster to return from it in the normal operation. In case systems of DR alarms are in down condition, DR alarms can loss their money and a team need to recover it as fast as possible to minimize the data. Same as RPO, shorter RTO requires faster storage, technologies and networks and also need more expenses (Alshammari et al., 2018).

Cloud computing has completely changed the whole industry in the field of data protection. Cloud backup is most popular method for data storage with respect to information protection. Cloud backup is highly efficient as an alternative of traditional strategies.

Cloud storage, a model of data storage which is able to access, store and manage data in remote cloud server through internet. In DR alarms, employee can access their data in any time as per their requirements. It has some characteristics like, fully responsible in back end support, self-service based, elastic that depends on customer’s need, can be accessed at any time, can be shared by multiple users and calculates only resources for each user (Alshammari et al., 2018).

Types of cloud backup

Figure 1: cloud storage

(Source: Reed, 2018)

Cloud backup has three types, public clouds, hybrid cloud, and private cloud. Public cloud has lower cost, on-demand scalable, multitenant implementation and it is perfect to store unstructured and sensitive data. Hybrid cloud has cost effective and smoothly transfer data among systems. Sensitive data or information can be hacked in the hybrid cloud backup. It the combination of cloud storages which has benefits of environment. Private cloud backup is too expensive, customized, data security on high level and safety. It has direct management in the organization would be helpful for DR alarms as well as. It has single tenant implementation. Private cloud has confidential storage for data and component of mission- critical (Pettit, Croxton, & Fiksel, 2019).

Data backup procedure

  • Purchase the process of cloud backup

  • Install software in the IT system

  • Choose the folders, application file to backup

Backup schedule

It shows the periodicity in backups. In this section backup cover is done at the remote location through service provider.

Objective

Backup plan

Security plan

Completion time

Primary objective

It provides business continuity plan after the disruption.

Data asset after data breach

On daily basis.

Response requirement

Communication with stakeholder

Evidence collection and preservation

Before a process has been started.

Tactical different

Accuracy and recovery

Prevention for future loss

After completion of process.

Plan management

Best practices and learned lesson

New cyber security threats and modification

Before going to next process.



Table 1: Backup schedule

Data recovery

  1. Data recovery will able to go on process once credentials have been provided, so after these credentials has been provided then browser forward it to the cloud storage, then employee or anyone will click on the name of a machine to retrieve data.

  2. Software will show disk level and file level archives of the data of this machine.

  3. User will click the required data, if it is promoted then enter the archived password.

  4. After that software will show all the folders and files for archive, user will find their file and folders for recovery.

  • User have to browse for recover that data folder.

  • Or use have to search the list of folders and files.

  1. User have to select any file or folder to recover

  2. Then user have to click on download

  3. Then user have to select a location to save archived data (Kumar, Raj, & Jelciana, 2018).

Data retention

Employee data

Retention period

Under 18 years

4 years

For collective redundancies

4 years

Parental leave

9 years

Records for tax

7 years



Table 2: Data retention

Action for backup plan

No.

Action

Who Performs (Responsible person)

1.

Review the program in IT management which secure approvals required accordingly.

Head of IT Ops and Data backup admin of DR alarms

2.

Identifies the data for backup

Backup admin, backup team of DR alarms

3.

Identifies systems to backup

Backup admin, backup team of DR alarms

4.

Identifies other resources for back up

Backup admin, backup team of DR alarms

5.

Schedules backup activity

Backup admin, backup team of DR alarms

6.

Programs backup system and resource according to the schedules and policies

Lead Backup admin, backup team of DR alarms

7.

Schedules rotation activities and tape backups

Backup admin, backup team of DR alarms

8.

Executes backup of data, system and other resource

Backup admin, backup team of DR alarms

9.

Ensures, tape is secured for pickup and properly labeled

Backup admin, backup team of DR alarms

10.

Verifies, backup was completed and all backed-up resources has been unchanged

Backup admin, backup team of DR alarms

11.

Prepares and distributes backup reports

Backup admin, backup team of DR alarms

12.

Schedules and conducts the test of data backup

Backup admin, backup team of DR alarms

13.

Schedules and performs the patching in backup resources

Backup admin, backup team of DR alarms

14.

Updates technologies and backup systems as needed

Backup admin, backup team of DR alarms



Table 3: Action plan table

Applicability

This backup plan can be applicable for employees and all office members as well as to corporate records.

Benefits of backup plan

  • Less downtime

  • Gives quick access to a file

  • Provides protection against the power failure

  • Add anti-viruses to protect data

  • Gives recovery from operating system failure



  1. Disaster recovery plan

Purpose

To help in recovery, prevention, and repairing from potential threats which are affecting DR alarms. DRP focuses on advance technologies. It provides instructions for responding during period of disaster. These disasters have included cyber and environment relevant events. It also has focus on gathering information and decision-making coordination to understand any specific situation (Schätter et al., 2019). The purpose of the disaster recovery plan for cloud back and cyber security, to ensure that DR alarms has prepared to respond in case of a disaster and in case of any emergency,



Scope

To recover from disaster for cyber security, it includes quick availability of resources in restoring of data and information system. A disaster can classified in some terms like sudden events, natural disaster, and wide scoping, detrimental damages. In risk management of information system, disaster recovery plan helps in critical subset of larger entity in DR alarms business continuity plan.




Goals and Objectives

Goal of the disaster recovery plan is to save DR alarms in disaster condition or any treat condition.

To ensure that DR alarms can respond in during of disaster and other emergency that affects systems of DR alarms and minimizing the risks such as cyber-attacks.

To provide cyber backup in DR alarms and recovery from data lost in any disaster condition or down time of DR alarms.



Disaster recovery plan also involves some other points like how it differs from any traditional recovery plan, how cloud back works, how cloud backup and cyber security etc. There is some exclaimed view to recover data by help of cloud backup and cyber security. Traditional plans involve remote plans, which requires daily backup and maintenances in support part. In the condition of protection of data and recovery from disaster needs manual performance. Due to these reasons, it can be time consuming and source sensitive process. Cloud backup stores critical data and files in cloud storage and failing it over the secondary site to prepare for disaster events. Cloud backup provides a pay as you go based approach that able to access from anywhere and anytime. Back and disaster recovery in cloud backup has automated and needs minimum inputs in the parts (Sanchis, & Poler, 2019).

Working of cloud backup in disaster recovery

It would create, test and update a disaster recovery plan in DR alarms to prepare it in case of hacking or cyber-attacks. It would provide a safety and continuity it the business and networking in the business. It would take the account inn infrastructure condition, recover it from potential treats, and provide disaster recovery strategies. In the disaster condition it would allow to design a DR plan which has automate power to each step of a recovery process. Traditional backup plans would be more complex as compare it the cloud backup, it has more advances techniques to make a recovery process easy. In other way traditional backup plans requires more maintenance and support of a physical disaster recovery plan and that would be more expensive and more time consuming. Cloud backup has more facilities to maintain backup data and it would help to DR alarms to face disaster events (Phillips, & Tanner, 2019).

Roles and Responsibilities

Roles and responsibilities show the working area, departments, related works of authorities and employees in the DR alarms.

Person Responsible

Contact Details

Role

Responsibilities

Managing director

[Email]

[Phone]

[Mobile]

Recovery Process Lead

Oversees and manages the execution of disaster recovery plan in DR alarms

Engineering director

[Email]

[Phone]

[Mobile]

Contact Person for cyber security department

  • - Collects required information

  • - Initiates plan in department of security

  • - Complete procedures

  • - Reports for Recovery Process

Manager

[Email]

[Phone]

[Mobile]

Communication Lead

  • - Establishes communication plans team

  • - Create communications plan

  • - Manages implementation

  • - Reports the Recovery Process



Table 4: Roles and Responsibilities

Assets and Resources

Assets and resources provide identification and management tools of system in DR alarms. It includes security management software, vulnerability scanning tool and active and passive networking solutions of monitoring.

Natural or land resources

Labor or human resources

Capital or machinery resources

Entrepreneurship



Insurance Policies

Insurance policy for cyber security generally applied for the business’s liability during data breach including sensitive customer data like security keys, credit card number, their account number, driving license number and any health records.

  • Cyber security insurance for individual-

This policy will be used by individual person, employee will back up their data on daily basis. This policy would be help to recover risks of fraudulent and data theft, cyber-attacks, malware attacks, cyber stalking and social media liabilities (Nawari, & Ravindran, 2019).

  • Cyber liability insurance-

It would recover all the risks that are associated with information technologies. It will collect personal information of customers and financial data on their server (Svilicic et al., 2019).



Essential Documents and Data Backup

Cyber security requires qualifications like degrees in computer science, information technology and system engineering or another related field. It also requires some experience in field of cyber security such as detection of incidents, forensics and responses (Nachiappan et al., 2017).

Data backup devices

USB stick – storage device

External hard drive – storage device

Cloud storage – at cloud server

Time machine – use as a hard drive for mac users

Network storage – backup file to network attached storage

Printing – hard copy



Communication Plan

Communication plan defines the need for being aware of and informed about any project. It shows the process that how an information will distribute and who will responsible for that. It is a main part of any risk management plan (Kache, & Seuring, 2017).

Role

Task

Contact

Engineering director

Set codes and instructions

Email ID

Managing director

Risk management

Email ID

Security manager

Set prevention goals in any disaster situation

Email ID



Table 5: Communication plan

Action Plan

For action plan it is needed to clear backups that provides copy of data and solutions to recover them in various situations. It stores a second copy of important files and important data to provide a safe backup for that data and files.

Department / Person Responsible

Task / Procedure

Status

Risk minimization

In progress

Identify sensitive data

In progress

Inventory of hardware and software

In progress

Crisis communication plan

In progress



Table 6: Action Plan

Benefits of disaster recovery plan

  • Cost efficiency.

  • Better understanding in scalability.

  • Increase the productivity of employment.

  • Increase the customer retention.



Conclusion

Cloud backup has a top position at this time, which is best option to back data of any business or organization, it would be helpful for DR alarms also. A proposal to develop a Business continuity plan for DR alarms has been developed in this report. BCP plan has so many benefits and it will provide protection to DR alarms in threat prevention from cyber-attacks. It will help in finding risks that are affecting DR alarms in event of cyber-attacks and any other natural disaster. It has benefit to providing risk mitigation which has risk management strategies. Needs of a business continuity plan has been discussed in this report. With BCP in DR alarms there has been also discussed the business impact analysis for DR alarms, a proposal for incident plan, backup plan to recover the lost data and disaster recovery plan has been discussed with their purpose and scopes for each. Risks have been found and discussed properly in this report and required solutions have been discussed. These plans would help DR alarms in down times and provides suitable data backup concept and new advanced technologies with benefits. There is cloud backup approach is suggested in this report which provides backup methods and recovery methods to recover data losses. There is also a recommendation for cyber security that each employee of DR alarms should have limitation on social network.

References

Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology71(8), 939-953. https://doi.org/10.1002/asi.24311

Ahmadian, N., Lim, G. J., Cho, J., & Bora, S. (2020). A quantitative approach for assessment and improvement of network resilience. Reliability Engineering & System Safety, 106977. https://doi.org/10.1016/j.ress.2020.106977

AlDairi, A. (2017). Cyber security attacks on smart cities and associated mobile technologies. Procedia Computer Science109, 1086-1091. https://doi.org/10.1016/j.procs.2017.05.391

Alshammari, M. M., Alwan, A. A., Nordin, A., & Abualkishik, A. Z. (2018). Disaster recovery with minimum replica plan for reliability checking in multi-cloud. Procedia computer science130, 247-254. https://doi.org/10.1016/j.procs.2018.04.036

Genç, R. (2017). The importance of communication in sustainability & sustainable strategies. Procedia Manufacturing8, 511-516. https://doi.org/10.1016/j.promfg.2017.02.065

Ghafur, S., Kristensen, S., Honeyford, K., Martin, G., Darzi, A., & Aylin, P. (2019). A retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ digital medicine2(1), 1-7. https://doi.org/10.1038/s41746-019-0161-6

Hamid, A. H. A. (2018, January). Limitations and challenges towards an effective business continuity management in Nuklear Malaysia. In IOP Conference Series: Materials Science and Engineering (Vol. 298, pp. 1-11). doi:10.1088/1757-899X/298/1/012050

Kache, F., & Seuring, S. (2017). Challenges and opportunities of digital information at the intersection of Big Data Analytics and supply chain management. International Journal of Operations & Production Management. https://doi.org/10.1108/IJOPM-02-2015-0078

Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science125, 691-697. https://doi.org/10.1016/j.procs.2017.12.089

Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences8(6), 898.  https://doi.org/10.3390/app8060898

Mendhurwar, S., & Mishra, R. (2019). Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges. Enterprise Information Systems, 1-20. https://doi.org/10.1080/17517575.2019.1600041

Nachiappan, R., Javadi, B., Calheiros, R. N., & Matawie, K. M. (2017). Cloud storage reliability for big data applications: A state of the art survey. Journal of Network and Computer Applications, 97, 35-47. https://doi.org/10.1016/j.jnca.2017.08.011

Nawari, N. O., & Ravindran, S. (2019). Blockchain and building information modeling (BIM): Review and applications in post-disaster recovery. Buildings9(6), 149. https://doi.org/10.3390/buildings9060149

Niemimaa, M., Järveläinen, J., Heikkilä, M., & Heikkilä, J. (2019). Business continuity of business models: Evaluating the resilience of business models for contingencies. International Journal of Information Management49, 208-216. https://doi.org/10.1016/j.ijinfomgt.2019.04.010

Pettit, T. J., Croxton, K. L., & Fiksel, J. (2019). The evolution of resilience in supply chain management: a retrospective on ensuring supply chain resilience. Journal of Business Logistics40(1), 56-65. https://doi.org/10.1111/jbl.12202

Reed, J. (2018). Redirecting. Doi.org. Retrieved 22 January 2021, from https://doi.org/10.1016/j.jnca.2017.08.011.

Rezaei Soufi, H., Torabi, S. A., & Sahebjamnia, N. (2019). Developing a novel quantitative framework for business continuity planning. International Journal of Production Research57(3), 779-800. https://doi.org/10.1080/00207543.2018.1483586

Sanchis, R., & Poler, R. (2019). Enterprise resilience assessment—A quantitative approach. Sustainability11(16), 4327.  https://doi.org/10.3390/su11164327

Schätter, F., Hansen, O., Wiens, M., & Schultmann, F. (2019). A decision support methodology for a disaster-caused business continuity management. Decision Support Systems118, 10-20. https://doi.org/10.1016/j.dss.2018.12.006

FAQ's