13.6.2 Disaster Recovery Management
| Specification Content/Learning Outcomes |
Disaster recovery management looks at how Information Systems are vulnerable to a wide variety of threats to security and how the risks associated with these threats can be minimised.
|
Resources - Disaster Recovery Management
| Key to resources: |
|
PowerPoint presentation | Word file | Acrobat file | ||
| Internet resource |
| Resource |
Type |
Size |
Notes |
| Computer Disasters |
|
n/a | Very interesting and useful page from the KJS. Good insights for all aspects of 13.6. |
| Disaster recovery |
|
29Kb | Notes from David Yates. |
| Disaster planning |
|
75Kb | Short PowerPoint presentation based on Heathcote Ch.46. |
| Disaster recovery |
|
103Kb | PowerPoint presentation from Chris Brown. |
| Risk analysis techniques |
|
n/a | A good explanation of RAT from the Disaster Recovery Journal |
Add/suggest new resources - Click here to suggest new resources relevant to this topic. Do NOT add attachments e.g. Word documents to your suggestions as these will be discarded.
Reading -
Disaster Recovery Management
Texts other than Heathcote can be found in the ICT section of the Library
Resource Centre.
| Key to reading: | Heathcote - Core Text | Internet resource | Other book | |||
| Handout/worksheet |
| Reading |
Type |
Size |
Notes |
| Security Policies |
|
n/a | Heathcote Ch.45 Pages 248 - 253 |
| Disaster Recovery |
|
n/a | Heathcote Ch.46 Pages 254 - 256 |
| Legal and security aspects |
|
n/a | Doyle Ch.14 Pages 210 -225 |
| Threats to information systems |
|
32Kb | One page Word handout concentrating on Personnel Controls. |
| Risk analysis |
|
25Kb | Word handout about the concept of risk analysis and contingency planning. |
Practice questions/homework - Disaster Recovery Management
| Key to questions: | Past exam question | Heathcote question |
|
Other question | ||
| FatMax assignment | Smokin' Dog assignment | |||||
| Reference |
Type |
Size |
Question |
| 1. ICT4 Question |
|
n/a |
A company has procedures to backup the data
files held on its computer system on a regular basis. |
| 2. ICT4 Question |
|
n/a | An Internet sales
company carries out its business with the assistance of a database system
running on a network of PCs. The main tasks are the processing of customer
orders and the logging of payments. You have been asked to advise the
company on backup strategies and to explain their importance.
(a). Give two reasons why it is essential that this company has a backup strategy. (2) (b). State five factors that should
be considered in a backup strategy, illustrating each factor with an
example. (10)
|
| 3. ICT4 Question |
|
n/a |
Employees can often be responsible for causing
loss or damage to their company’s data. Regular backups are taken by the
company, but in order to prevent employees from causing such loss or damage,
describe:
(a). two measures that could be incorporated into the hardware used; (4) (b). two software features that could be used; (4) (c). two other procedures that the
company could introduce. (4) |
| 4. Heathcote disaster recovery question. |
|
n/a | A small company
runs a network of four PCs on which it keeps records of stock, customer
accounts, a mailing list and a multitude of word-processed documents. Draw
up a security plan for this company to ensure that it will be able to
continue operating normally within a day or so of a disaster such as a fire. (20 marks) |
| 5. Heathcote disaster recovery question. |
|
n/a | Describe five
facilities that may be provided by a Disaster recovery Service to which a
major bank may subscribe/ (5 marks) |
| 6.
Disaster recovery scenarios 1 (adapted from Doyle) |
|
n/a |
What can
organisations do in order to minimise the damage caused by: |
| 7.
Disaster recovery scenarios 2 (adapted from Doyle)
|
|
n/a | What
can organisations do in order to minimise the damage caused by: (a) the deliberate alteration of data by hackers (b) key members of staff leaving with the organisation's expertise (c) loss of communication in a WAN (6 marks) |
| 8.
Disaster recovery scenarios 3 (adapted from Doyle) |
|
n/a | What
can organisations do in order to minimise the damage caused by: (a) loss of premises due to a fire or flood (b) deliberate destruction of data by a disgruntled employee. (4 marks) |
| 9. 1998 NEAB IT04 Question 9 |
|
n/a | "Information
systems are mission critical, the consequences of failure could prove
disastrous." Discuss this statement, including in your discussion
Quality of
language will be assessed in this question. |
| 10. ICT4 Question (part c is especially relevant to this topic) |
|
n/a | A Medical
Practice has installed a new information system that links patient records
and prescriptions to the financial systems of the practice. The financial
records must be secure against fraud as they are used to claim money from
the Health Authority. (a). Describe four factors that should be included in an IT security policy for the practice. (8) (b). Describe one measure the practice could take to show that their records were accurate. (2) (c). Describe three criteria that could be used to select a disaster contingency plan to recover from a breakdown of this system. (6) (16 marks) |
| A2 Modules | ICT4 | Links | Top | Home | FatMax1 |
Copyright/Disclaimer - I think everyone whose work appears on this site has been properly attributed and credited. If not, get in touch and I'll make the necessary amendments. FatMax 2002.