StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Business Continuity & Disaster Recovery Planning Models Comparison - Coursework Example

Cite this document
Summary
Disaster recovery is a term that is use to refer to business resumption after any form of disruption while on the other hand, business…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Business Continuity & Disaster Recovery Planning Models Comparison
Read Text Preview

Extract of sample "Business Continuity & Disaster Recovery Planning Models Comparison"

Business Continuity & Disaster Recovery Planning Models of Learning Disaster recovery and business continuity planning refers to all those processes that aid an organization to recover from a disruptive event. Disaster recovery is a term that is use to refer to business resumption after any form of disruption while on the other hand, business continuity refers to an approach that ensure the organization continues to make money during the challenges (Snedaker, 2007). This paper will analyze two models that are used in the business recovery and continuity to highlight their similarities and differences between them.

The first model is the Seven Tiers recovery model that was developed by IBM in 1992 defining various methods important computer systems (Quintero etal., 2013). The model has seven levels in which data can be recovered with varying levels of success. The progression of the tiers from 1-7 is characterized by reduced recovery time and increasing chances of data recovery (Carstensen, Morgenthal & Golden, 2012).The second one is the Security Stack four-layer model that offers ways to comprehensively respond to an incident.

The first layer deals in disaster recovery, the 2nd layer on business continuity, the 3rd on situation awareness and the last layer is on Government Policy and National Incident Management (Mikulsky & Carroll, 2011). This model reduces the tendency of business continuity and business recovery plans fragmentation which reduce their effectiveness in event of a disruption (Troppens, 2009).The 7 Tier and the Security Stack model bear similarities in that the progression in the levels ensures minimal data loss and reduces the time required for business recovery and continuity.

In addition, they both offer different levels which can help improve the data recovery success. Lastly, they provide a multi-level approach that enhances business recovery and continuity (Snedaker, 2007).ReferencesCarstensen, J., Morgenthal, J. P., & Golden, B. (2012). Cloud Computing: Assessing the Risks. Ely: IT Governance Publishing. Retrieved from: http://books.google.co.ke/books?id=PORgAgAAQBAJ&printsec=frontcover&dq=Carstensen,+J.,+Morgenthal,+J.+P.,+%26+Golden,+B.+(2012).+Cloud+Computing:+Assessing+the+Risks.

+Ely:+IT+Governance+Publishing&hl=en&sa=X&ei=s5e_U9fDIOLT7AaHv4D4AQ&redir_esc=y#v=onepage&q&f=false Mikulsky, D. & Carroll, T. (2011, June). The Security Stack for Business Continuity and Disaster Recovery. CSC. Retrieved from: http://www.csc.com/cybersecurity/insights/67598 the_security_stack_for_business_continuity_and_disaster_recoveryQuintero, D., & International Business Machines Corporation. (2013). Exploiting IBM PowerHA SystemMirror V6.1 for AIX Enterprise Edition. Poughkeepsie, NY: IBM Corp.

, International Technical Support Organization. Retrieved from: http://my.safaribooksonline.com/book/operating-systems-and-server-administration/0738437999/part-1-introduction/7841p01_xhtml Snedaker, S. (2007). Business continuity & disaster recovery for IT professionals. Burlington, MA: Syngress. Retrieved from: http://my.safaribooksonline.com/book/technology-management/disaster-recovery/9780124105263/chapter-1dot-business-continuity-and-disaster-recovery-overview/st0030_chp001_html?query=((Business+continuity+%26+disaster+recovery+for+IT+professionals))#snippet Troppens, U. (2009). Storage networks explained: Basics and application of Fibre Channel SAN, NAS, iSCSI, InfiniBand and FCoE.

Chichester, West Sussex, U.K: Wiley. Retrieved from: http://books.google.co.ke/books?id=w1xX9OJYdmEC&printsec=frontcover&dq=Troppe ns,+U.+(2009).+Storage+networks+explained:+Basics+and+application+of+Fibre+Chan nel+SAN,+NAS,+iSCSI,+InfiniBand+and+FCoE.+Chichester,+West+Sussex,+U.K:+Wi ley.&hl=en&sa=X&ei=75e_U4bAJYye7AaNjoGQDA&redir_esc=y#v=onepage&q&f=f alse

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Business Continuity & Disaster Recovery Planning Models Comparison Coursework”, n.d.)
Business Continuity & Disaster Recovery Planning Models Comparison Coursework. Retrieved from https://studentshare.org/information-technology/1652153-business-continuity-disaster-recovery-planning-models-comparison
(Business Continuity & Disaster Recovery Planning Models Comparison Coursework)
Business Continuity & Disaster Recovery Planning Models Comparison Coursework. https://studentshare.org/information-technology/1652153-business-continuity-disaster-recovery-planning-models-comparison.
“Business Continuity & Disaster Recovery Planning Models Comparison Coursework”, n.d. https://studentshare.org/information-technology/1652153-business-continuity-disaster-recovery-planning-models-comparison.
  • Cited: 0 times

CHECK THESE SAMPLES OF Business Continuity & Disaster Recovery Planning Models Comparison

Crisis Monitoring and Communication

12 Pages (3000 words) Essay

Crisis Management in the Oil and Gas Industry

AN ASSESSMENT AND CRITIQUE OF CRISIS MANAGEMENT IN THE OIL AND GAS INDUSTRY IN ENSURING COMPANY continuity Abstract An abstract is required.... Guidelines for development of the abstract can be found in section 2.... 4 of the APA Publication Manual, 6th edition.... hellip; The target length of the abstract in Capella doctoral dissertations is 350 words or less....
65 Pages (16250 words) Dissertation

Red Cross: Importance of Planning and Control

Red Cross: Importance of planning and Control ... Objective of the research This paper seeks to research the importance of planning and control in the operations of Red Cross with a view to improve the performance levels of the national Red Cross Societies.... Importance and scope of the research: Ever increasing need for resources due to disasters, internal unrest, violence, terrorism and war necessitates efficiency in utilization of available resources through proper planning and control in tune with the unique environmental challenges which vary from case to case....
35 Pages (8750 words) Research Paper

Storage Area Networks

Secondly, in comparison to a client / server model that supports server-centric data management operations, SAN facilitates the organization with a data-centric model making it possible to transfer large amounts of data without being dependent of the server.... rom the traditional management model of managing data on the local machines, the IT infrastructure organization and management took a new turn in 1990s with the introduction of the new client-server model, allowing multiple client machines to connect to a single server for data management, storage, backup and recovery operations....
6 Pages (1500 words) Essay

The Different Kinds of Technology Being Used in Business

Technology is being used to manage… In the contemporary world of business, the most popular topic that we come across these days is of technology, the businesses having superior technology is being flourished faster than other companies, since use of technology diminish cost, amplify This is the reason, majority of companies are ready to spend huge amount of their capital on R&D (research and development).... In an increasingly networked world information of varying quality is being aggregated for business use....
10 Pages (2500 words) Research Paper

The International Events and Conference Industry

In recent years, the international events and conference industry has become a dynamic place, where the development of new ideas and concepts follows globalization trends.... The international events industry is ever-changing, but while some countries excel as the major… Millions of people attend public events and conferences, to expand their knowledge and establish personal and professional contacts....
13 Pages (3250 words) Literature review

Developing a System for CalaKare Pty Ltd to Manage the Documentation Problem

This organization CalaKare has been facing difficulties in documenting their formal procedures that were creating a problem in business continuity.... By espousing niche market strategies the organizations in the present day competitive domain has been managing their business continuity through the innovation processes.... In this context, an opportunistic employee operating in the information security group plans to design a system that would help in implementing a risk management tool to ensure continuous business development....
16 Pages (4000 words) Research Paper

Information Security the Using Business Impact Analysis

For Automotive Paint Suppliers, serving more than 1000 customers in Western Australia, the need of coming up with incident response and disaster recovery regarding information security is an urgent issue, based on the fact that more than 80% of businesses fail if faced with any form of information attack.... This will include planning before and after the occurrence of any given incidents as well as the necessary training to the IR teams.... BIA consists of explanatory components that reveal all possible vulnerabilities and planning components aimed at developing strategies for risk mitigations....
21 Pages (5250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us