MIS102 DATA AND NETWORKING ASSIGNMENT HELP
Now in today’s world, most companies are dealing with IT. Lots of operations are done with data. It is obvious that such companies cannot predict when there will be a disturbance. So most of them are adopting disaster recovery plan so that the business should not hamper and all data should remain safe. Similarly, the following work will be for the security if Cyber Infrastructure who wishes to maintain a fail proof system in the networking base and have a Disaster Recovery Plan.
Multi Write Group = Australia
AU Router: Set write precedence
AU1, AU2, AU3
AU3: Dsa flag=multi write group hub
Multi Write Group = India
IN Router: Set write precedence
IN1, IN2, IN3
IN1: Dsa flag=multi write group
Introduction and Importance
Network disaster recovery plan is a technique of securing and recovering all the data that exist in a network. There are different events which is responsible disaster in IT World like fire, flood, earth quake, cyber-attack, equipment failure, terrorism etc. Network disaster recovery plan ensures that all the things should run fine despite of all disaster events. Disaster can be happened in different forms and size we cannot predict what their impact would be, which network component would be affected and how many resources would be required to restore the network connectivity. So for Cyber Infrastructure which has its operation outside Australia requires to plan a worst case scenario in advance and finding the ways to migrate their impact is the best idea for ensuring successful network disaster recovery.
Steps to be taken by the company:
Case 1: There is sudden internet outage
In IT sectors we have high speed and reliable internet yet we can’t predict when the system is going to be down, so we must have a plan in these cases so that we don’t relay on internet outage.
The server hosting the database and project is running in virtual application server in server room, using a network storage device to store massive amount a graphic data you have. The application server is a part of high availability cluster along with similar physical server, meaning that if the primary server is down, the virtual machine will relaunch on the secondary server. Cyber Infrastructure have other servers in place that perform other function as well.
A resilient, redundant, backup communication network is essential to business continuity and disaster recovery plan. From unplanned internet outage to longer natural disaster and man made threats loosing internet connectivity and mission critical communication can freeze the business and organisation operation productivity and safety (Mishra et al. 2020). A cellular wireless backup plan can provide Cyber Infrastructure, almost immediate connectivity in the event where wired network goes down. A wireless backup network communication network is reliable cost efficient solution to protect your business and organisation from costly outage, keeping you connected by cellular internet for business operation continuity during interruptions.
Case 2 : A malware (e.g virus) has infected the computer in company network
Ransomware is so sneaky, can slip virtually undetected into computing environment cleverly disguised as a link or as a file in a legitimate looking email educating office staff on better cyber hygiene. These are the primary virus concern against which best steps can be inculcated by companies like Cyber Infrastructure to prevent these malware infections on the front line. Security, disaster recovery and business continuity begins and ends with human awareness protocol. If office staffs engaging in cyber interfaces are clueless what Ransomware exploit look like or know the characteristics of the viruses the knowledge of policies, security and other factors of antivirus will not be effective in long run of data protection technology.
Since many have no basic understanding of what ransomware even look like or how it operates. Ransomware uses encryption in a very aggressive insidious way to lock up your database infects using public-private key encryption interface or procedure to do so. It will quietly upload file “payload” into hard drive.
Removing malware is not easy even if you have latest antivirus installed since malware removing technique vary widely you will need to have some idea about the malware infecting your system (Ismael, 2017). Some malware can safely be removed by rebooting the computer into safe mode or booting it up from an external recovery drive or disk. However, there is only one way to be sure and unfortunately that involves wiping the machine clean which means all the data stored on it will be lost forever.
If the data has been deleted or encrypted you might be able to get it back by third party data recovery software although these software high in price.
Case 3 : There is no local area network for the entire company? Is there a way to diagnose if this is a hardware failure? What communication protocol stack might be affected?
Hardware failure is a failure of hardware component to function to its specifications. There are some reasons for hardware failure such as
Harsh environmental condition such as extreme temperature can damage hardware component.
Unregulated power supply of any sort can damage hardware component. This includes power surges from the regular power line or from lightning.
Incompatible hardware component can include different communication protocol or methods.
Troubleshoot the hardware component which is misbehaving. Restart the misbehaving component such as reader to see if that simple action can solves problem. However consider the consequence and impact of restarting a hardware component of a running system.
Because of this TCP/IP protocol stack might be affected
Case 4 : Only one part of company loses internet connection
The server hosting the database and project is running in virtual application server in server room, using a network storage device to store massive amount a graphic data you have. The application server is a part of high availability cluster along with similar physical server, meaning that if the primary server is down, the virtual machine will relaunch on the secondary server. Companies like Cyber Infrastructure have other servers in place that perform other function as well.
Case 5 : Power outage
Power outage can happen not only by natural disaster but also accidents or electrical company outage and this c leave company powerless to do anything.
There are few things you can invest to help keep you online in the event of this happening.
Having a backup generator is the most important thing in this case.
If the business is completely dependent upon computer and internet then company can have universal power supplier.
Case 6: Data security beach
In case of virus or malware, the more people who open email the more computers will be infected. Hackers can continue accessing the files as long as they have open access.
If the threat is coming from inside the building, they will want the IT team to be able to clearly see the source of the issue.
The risk here is that if actuation have under trained IT professional panicking and changing the settings, it may be difficult for your IT team to understand what really happened and diagnose the root cause of the issue (Puthal et al. 2018). The IT professionals and senior leadership team of Cyber Infrastructure needs to set aside blame and be in tight communication about what happened and how to proceed in fixing the data security beach.
Case 7: Precautions and Post Planning
Identify your assets and capabilities
Get everyone involved and ensure communication
Create redundancy via distributed backups
Test your disaster before you need it
Try the ‘Chaos Engineering’ approach
Prioritize risk management
Map the critical business process
Leverage public cloud service
Train your team and practice
Outline dependencies action item from day one
Include people management in your recovery plan
Coordinate with third parties and partners
Have a strong resilience posture
Perform frequent threat analyses.
Automate your data backup
A network disaster recovery plan should be there for any business regardless of size. Yes, the recovery plan cost money, time and effort but it is worth it because no one knows when a disaster will occur. Without a recovery plan, everything can be lost for Cyber Infrastructure.
Ismael, O.A., FireEye Inc, 2017. System, apparatus, and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection. U.S. Patent 9,736,179
Mishra, S., Anderson, K., Miller, B., Boyer, K., and Warren, A., 2020. Microgrid resilience: A holistic approach for assessing threats, identifying vulnerabilities, and designing corresponding mitigation strategies. Applied Energy, 264, p.114726
Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E. and Yang, C., 2018. The blockchain as a decentralized security framework [future directions]. IEEE Consumer Electronics Magazine, 7(2), pp.18-21