Discussion Questions for Business Information Systems
A company selects a data backup and recovery strategy in accordance with its objectives and operational needs. As a result, backups can be carried out hourly, daily, or weekly depending on the organization's essential information volume. The backup must be kept on a different server from the one hosting the original data. Inadequate data backup results in complete data non-recovery and loss of vital corporate data. One strategy is to perform spot checks on file system backups. This strategy entails performing a file-level backup to system critical files and performing a restore on a separate machine or folder within the same machine. A comparison between the restored data and the original files is done to ascertain that whether the backup is current or not. This ascertains that the backup process was correct and familiarizes the IT personnel with the system's restore functionality.
Another strategy is creating a test environment separate from the production environment to perform a full file system or database restore. This strategy is important in ensuring full recovery from complete data loss due to hardware failure, data destruction, or data loss (Barnes, Barnes and Rothstein 188). On successful restore, perform random file checks comparing them with original files to ensure they are similar. Additionally, compare the total space of storage utilized in the new test environment to the total storage space utilized in the original machine to ascertain the success of the restore (Watters 8).
Database recovery and verification is another important strategy. In this approach, a machine consisting of the database management system to that of the original server is used for database restore purposes. When a separate machine is not possible, the production machine may be used but the restored database is given a separate name from the original database. A spot check and macro check is then run on the database by comparing rows in critical tables for both the production and the recovered database to determine if they are of the same size. Similarly, one can execute similar queries against the recovered and production database to compare the results and determine if the backup was a success. It is also important to connect all applications to the new recovered database and ensure they operate properly.
Lastly, the IT manager may recommend various technologies such as electronic vaulting, database shadowing, and remote journaling (Doughty and CRC Press 368). These are methods that eliminate data backup risks, delays and safeguard the organization's data. This test is vital since the management needs to only see the business applications back online after a recovery is done to ensure business continuity.
Works Cited
Barnes, James C, et al. Business Continuity: And Hipaa : Business Continuity Management in the Health Care Environment. Rothstein Associates, 2004.
Doughty, K., and CRC Press. Business continuity planning: Protecting your organization's life. Auerbach, 2001.
Watters, J. ""Business Continuity Management."" Disaster Recovery, Crisis Response, and Business Continuity,2013, pp.3-20, doi:10.1007/978-1-4302-6407-1_1.
Academic levels
Skills
Paper formats
Urgency types
Prices that are easy on your wallet
Our experts are ready to do an excellent job starting at $14.99 per page
We at GrabMyEssay.com
work according to the General Data Protection Regulation (GDPR), which means you have the control over your personal data. All payment transactions go through a secure online payment system, thus your Billing information is not stored, saved or available to the Company in any way. Additionally, we guarantee confidentiality and anonymity all throughout your cooperation with our Company.