Disaster Recovery Document
Disaster Recovery Document
Disaster Recovery Document
Policies:
Submissions made through a means other than the D2L Dropbox will be ignored
and earn a 0.
Submissions not in an rtf or pdf file or with the original questions and/or
formatting removed from the file earn a 0.
Second chances might be requested at any time through D2L email, and are
awarded at the sole discretion of the instructor.
The assessment of risk is a key step to a successful business continuity effort. Being
successful in this course requires you to understand how to assess risk and use this
assessment in developing plans for business continuity and related areas. This exercise
intends to aid you in doing so.
Respond to this assignment within the rtf file (leaving all questions and formatting
intact)
Q1) Read, review and analyze Chapter 4 and Appendix A of the textbook:
Answer: Risk management is the process identifying risk, assessing the risk and
taking steps to minimize the risk
Threat assessment
Vulnerability assessment
Impact assessment
Threat Assessment: The initial step in the risk analysis is identifying the likelihood
of possible threats to the company. The quantitative method uses numbers to
represent the threats whereas qualitative uses business terms to represent possible
threats to the business. Various threats to the business are taken into consideration
and assessed according to the impact they create to the business depending on their
occurrence probability.
Based on the table above all the vulnerabilities are rated accordingly and moved to
next phase.
Impact Assessment: Based on the likelihood of the occurrence of the events, the
amount of imapct created to the services and business is being focused in this
particular segment.
Risk mitigation strategy is developed accordingly, to events with highest frequency.
For example the whole cycle would be as described below, took from the textbook
Where does risk assessment fall in that process and what is the risk assessment
sub-process?
Risk assessment is generally divided into subprocess to make the cycle simple and
easier to implement.Risk assessment is a part of risk management and sub
processes include
Threat Assessment
Vulnerability Assessment
Impact Assessment.
How should people, process, technology and infrastructure factor into risk
management?
Answer: People: People here refers to all the employees in an organization
starting from cleaners to CEO. Necessary reviews must be taken from each
individual by conducting surveys as a part of risk assessment. IT staff should be
given enough equipment to test the environment and develop a risk mitigation
policy. Trainings must be given to employees if necessary.
Process: A process is being developed based on the employees views regarding
the probable risks to the company. It establishes the process which can mitigate
the risks from gorvnance bodies to all parts of the company.
Technology & Infrastructure: Technology and infrastructure play a vital role in
risk management. Sufficient infrastructure along with sophisticated technology
should be provided to the risk management team so that they can develop an
efficient strategy to mitigate the oncoming risks.
For an example, Company offering cloud services should be able to provide test
servers in spare to test the functionality and cluster services provided by them.
What are some information gathering methods and which do you recommend for
a personal1 risk (and vulnerability) assessment?
Answer: If I had to develop a risk assessment then, I would have followed below
process to gather required information.
Surveys
Seminars
Discussions
On-site interviews
In my point of view, The information is collected based on the following factors.
Security Requirement
Databases information
1
If you are unclear about this requirement consider as those risks in the way of your personal business, i.e.,
those steps you need to take in maintaining your status as a student, e.g., assignments, records, etc.
What are the major categories of threats and some examples from each?
Answer: Threats are divided into 2 types. Natural threats, Human threats and
Infrastructure threats.
Natural threats include Earthquakes, Floods, Tornado, Tsunami etc (unnatural events)
Human threats include terrorists attack or accidental failures
Infrastructure threats include power outage.
Answer: Risks can be assessed in two ways, Quantitative and qualitative depending
on how they are assessed.
In Qualitative assessment risks are measured on a scale from high to low
representing the probability of the threats. Usually stakeholders determine the
occurrence and often their views and ratings are considered as a standard and design a
strategy accordingly.
Pros:
Risks are ordered in priority
Can determine the areas of greater risk with less time and are less costly
Quicker and simple in nature
Quantification of values of loss is not done but they are perceived.
Sequential rating of vulnerabilities can be done on a relative scale
Cons:
Cost benefit analysis is more difficult to attain with this method.
Not possible to determine the probabilities and results on numerical terms.
Quantitative Assessment: Assessment in this kind seems to be more accurate since the
assessment has a result in numbers, and determined based on pre-determined scales. But
this method is cost based.
Risk exposure = Potential loss X Severity of potential loss
Annualized loss expectancy which is the product of annual rate of occurrence and single
loss expectancy is calculated, followed by cost per impact and then tried to protect the
companys infrastructure.
Advantages:
ms.
Disadvantages:
What is vulnerability assessment? Does it just apply to IT? How does it apply to
IT-related business continuity plans?
What questions do you have remaining after your review and analysis of Chapter
4 and Appendix A?
Answer: Nothing
Q2) Our course textbook covers many of the materials, frameworks and resources for
Business Continuity and/or Risk Assessment or Risk Management. Search the web for
suitable additional and supplementary materials. (Hints: The section of Chapter 4 on IT
Specific Risk Management identifies many sources. Failure Mode and Effects Analysis
(FMEA) is becoming a best practice for risk assessment and prioritization in many
industry segments, including healthcare [2]. Although FMEA focuses on preventing
failures, it can provide a common risk-assessment framework that is well-understood
across an organization.) Identify, scan and assess at least two of these for use in this class;
report your findings here providing a summary paragraph of the contents of each of your
chosen sources:
Business Continuity Institute: This institute has been in the industry since 20years
promoting the awareness about business continuity. It certifies organization for business
professionals. It even offers various certifications to IT professionals on business
continuity.
It focuses on BCI events like Threats and opportunities events and enables the
individuals to participate in BCI related conferences. It also provides various many
related BC resources like BC24(online simulation incident game), Virtual work shop
recordings which are related to communication in crisis, Human aspects of business
continuity etc., DVD's on business impact analysis etc.
Disaster resource.com: This website shares all the information about emergency
management and all the news regarding DR management. It helps in finding
organizations who can help in getting prepared or recovering from a disaster. This
website shares entire information about vendors who can help in planning BC/DR.
Globalcontinuity.com: This website starts with an awesome picking line If you fail
to plan then you plan to fail. This portal has group of subject matter experts who can
help you mitigating the risk of business interruption.
Fema.gov: Federal Emergency Management Agency focus is to support and protect the
citizens against the unexpected disasters. They let localities to develop disaster
preparedness plan for a nation, incident management by conducting various surveys and
taking people opinion.
The (NAC) National Advisory Council advises FEMA administrators on all
aspects of emergency and incident management. Emergency kits and warning
systems(like tools used for communications) disaster survivor assistance, disaster
declarations and services are provided by the agency.FEMA's strategic plan is to enable
risk reduction services globally thereby making the organizations to build capability in
facing catastrophic disasters.
sba.gov: SBA stands for Small Business administration; which is an independent agency
of federal government which helps out in protecting data in a company. It helps us in
building and growing our business by understanding the federal market. It focuses on
data storage processing, strategic planning, policies and regulations etc., it gives
information about how to run and grow a business.
Q3) Review the quantitative method of risk and vulnerability assessment described in the
textbook. Develop a spreadsheet with the four columns from textbook page 201:
Sno
Threat
Earthquake 0.02
0.16
Sink holes
0.006
0.024
Power
0.0045
0.0135
0.1
0.4
0.1
0.1
outage
4
Employee
fraud
Tsunami
List up to five threat sources for your personal business in column one (Note: Appendix
A lists many possibilities from which you can choose); then, for each threat source, do
some research to determine the likelihood of occurrence, estimate your vulnerability
quantitatively and calculate your interim risk value. Attach the spreadsheet to your
assignment submission. What thoughts do you have about scaling up such a spreadsheet
from your personal business to the business of a larger organization, e.g., KSU?
The main goal of risk assessment is to reduce the level of its risk by adding appropriate
control measures.
In general, to do an assessment, you should:
Identify hazards.
Evaluate the likelihood of an injury or illness occurring, and its severity.
Consider normal operational situations as well as non-standard events such as
shutdowns, power outages, emergencies, etc.
Review all available health and safety information about the hazards
Identify actions necessary to eliminate or control the risk.
Monitor and evaluate to confirm the risk is controlled.
Keep any documentation or records that may be necessary including risk reports
and impact analysis reports.
The checklist is vital for any business to operate because it aids in mitigating the risks
involved in a disaster which is applicable either for my personal business or giant like
KSU.
Q4) Do you have any questions about the course at this time?
No
Q5) Lab Exercise Question:
Review and summarize your ideas and experience about risk assessment and risk
management. Discuss the steps you might recommend in scaling up what you did in
this assignment for your personal business to a larger organization such as KSU.
Dont forget to attach your spreadsheet to your discussion posting.
As discussed above, risk assessment and risk management help to build a better
company. A better company with a better risk strategy helps to provide better service.
Better service provides better customers. Better customers provide best business. Best
business leads to better company worth. As per my research on risk assessment I can
probably develop the below checklist.
Document the work including all the analysis and reports and strategy developed
Sources and works used in completing this exercise (if none, please explicitly state so):
1. Susan Snedaker and Chris Rima Business Continuity & Disaster Recovery for IT
Professionals 2nd Edition. Burlington:Syngress, 2014.
U.S. Veterans Administration Healthcare Failure Mode and Effects Analysis.
Retrieved on January 5 from
http://www.patientsafety.va.gov/professionals/onthejob/hfmea.asp
3. "Risk Assessment." Wikipedia. Wikimedia Foundation, 5 Dec. 2014. Web. 15 Feb.
2015. <http://en.wikipedia.org/wiki/Risk_assessment>.
4. "Common Menu Bar Links." Risk Assessment : OSH Answers. Canadian Centre of
Occupational Health and Society, 19 June 2006. Web. 15 Feb. 2015.
<http://www.ccohs.ca/oshanswers/hsprograms/risk_assessment.html>.
7. "Emergency Preparedness and You." |CDC. N.p., 30 Feb. 2014. Web. 30 Jan. 2015.
<http://emergency.cdc.gov/preparedness/>.
11. "The Business Continuity Institute." The Business Continuity Institute. N.p., n.d. Web.
31 Jan. 2015. <http://www.thebci.org/>.
12.