MIS102 DATA AND NETWORKING ASSIGNMENT HELP

Introduction

Now in today’s world, most companies are dealing with IT. Lots of operations are done with data. It is obvious that such companies cannot predict when there will be a disturbance. So most of them are adopting disaster recovery plan so that the business should not hamper and all data should remain safe. Similarly, the following work will be for the security if Cyber Infrastructure who wishes to maintain a fail proof system in the networking base and have a Disaster Recovery Plan.

Disaster Recovery Topology:

 

Multi Write Group = Australia

AU Router: Set write precedence

AU1, AU2, AU3

AU3: Dsa flag=multi write group hub

                                              Multi Write Group = India

                                   IN Router: Set write precedence  

                                   IN1, IN2, IN3

                                                   IN1: Dsa flag=multi write group       

                                                  hub

 

                                                    

 

 

                                                Multi Write Group = USA

                                                US Router: Set writes            precedence

                                                US1, US2, US3

US1: Dsa flag=multi wite group hub

 

 

Network Disaster Recovery Plan

Introduction and Importance

Network disaster recovery plan is a technique of securing and recovering all the data that exist in a network. There are different events which is responsible disaster in IT World like fire, flood, earth quake, cyber-attack, equipment failure, terrorism etc. Network disaster recovery plan ensures that all the things should run fine despite of all disaster events. Disaster can be happened in different forms and size we cannot predict what their impact would be, which network component would be affected and how many resources would be required to restore the network connectivity. So for Cyber Infrastructure which has its operation outside Australia requires to plan a worst case scenario in advance and finding the ways to migrate their impact is the best idea for ensuring successful network disaster recovery.

Steps to be taken by the company:

Case 1: There is sudden internet outage

In IT sectors we have high speed and reliable internet yet we can’t predict when the system is going to be down, so we must have a plan in these cases so that we don’t relay on internet outage.

The server hosting the database and project is running in virtual application server in server room, using a network storage device to store massive amount a graphic data you have. The application server is a part of high availability cluster along with similar physical server, meaning that if the primary server is down, the virtual machine will relaunch on the secondary server. Cyber Infrastructure have other servers in place that perform other function as well.

A resilient, redundant, backup communication network is essential to business continuity and disaster recovery plan. From unplanned internet outage to longer natural disaster and man made threats loosing internet connectivity and mission critical communication can freeze the business and organisation operation productivity and safety (Mishra et al. 2020). A cellular wireless backup plan can provide Cyber Infrastructure, almost immediate connectivity in the event where wired network goes down. A wireless backup network communication network is reliable cost efficient solution to protect your business and organisation from costly outage, keeping you connected by cellular internet for business operation continuity during interruptions.

Case 2 : A malware (e.g virus) has infected the computer in company network 

Ransomware is so sneaky, can slip virtually undetected into computing environment cleverly disguised as a link or as a file in a legitimate looking email educating office staff on better cyber hygiene. These are the primary virus concern against which best steps can be inculcated by companies like Cyber Infrastructure to prevent these malware infections on the front line. Security, disaster recovery and business continuity begins and ends with human awareness protocol. If office staffs engaging in cyber interfaces are clueless what Ransomware exploit look like or know the characteristics of the viruses the knowledge of policies, security and other factors of antivirus will not be effective in long run of data protection technology.

Since many have no basic understanding of what ransomware even look like or how it operates. Ransomware uses encryption in a very aggressive insidious way to lock up your database infects using public-private key encryption interface or procedure to do so. It will quietly upload file “payload” into hard drive.

Removing malware is not easy even if you  have latest antivirus installed since malware removing technique vary widely you will need to have some idea about the malware infecting your system (Ismael, 2017). Some malware can safely be removed by rebooting the computer into safe mode or booting it up from an external recovery drive or disk. However, there is only one way to be sure and unfortunately that involves wiping the machine clean which means all the data stored on it will be lost forever.

If the data has been deleted or encrypted you might be able to get it back by third party data recovery software although these software high in price.

Case 3 : There is no local area network for the entire company? Is there a way to diagnose if this is a hardware failure? What communication protocol stack might be affected?

Hardware failure is a failure of hardware component to function to its specifications. There are some reasons for hardware failure such as

  • Harsh environmental condition such as extreme temperature can damage hardware component.

  • Unregulated power supply of any sort can damage hardware component. This includes power surges from the regular power line or from lightning.

  • Incompatible hardware component can include different communication protocol or methods.

Troubleshoot the hardware component which is misbehaving. Restart the misbehaving component such as reader to see if that simple action can solves problem. However consider the consequence and impact of restarting a hardware component of a running system.

Because of this TCP/IP protocol stack might be affected

 

Case 4 : Only one part of company loses internet connection

The server hosting the database and project is running in virtual application server in server room, using a network storage device to store massive amount a graphic data you have. The application server is a part of high availability cluster along with similar physical server, meaning that if the primary server is down, the virtual machine will relaunch on the secondary server. Companies like Cyber Infrastructure have other servers in place that perform other function as well.

Case 5 : Power outage

Power outage can happen not only by natural disaster but also accidents or electrical company outage and this c leave company powerless to do anything.

There are few things you can invest to help keep you online in the event of this happening.

Having a backup generator is the most important thing in this case.

If the business is completely dependent upon computer and internet then company can have universal power supplier.

Case 6: Data security beach

In case of virus or malware, the more people who open email the more computers will be infected. Hackers can continue accessing the files as long as they have open access.

If the threat is coming from inside the building, they will want the IT team to be able to clearly see the source of the issue.

The risk here is that if actuation have under trained IT professional panicking and changing the settings, it may be difficult for your IT team to understand what really happened and diagnose the root cause of the issue (Puthal et al. 2018). The IT professionals and senior leadership team of Cyber Infrastructure needs to set aside blame and be in tight communication about what happened and how to proceed in fixing the data security beach.

Case 7:  Precautions and Post Planning

  • Identify your assets and capabilities

  • Get everyone involved and ensure communication

  • Create redundancy via distributed backups

  • Test your disaster before you need it

  • Try the ‘Chaos Engineering’ approach

  • Prioritize risk management

  • Map the critical business process

  • Leverage public cloud service

  • Train your team and practice

  •  Outline dependencies action item from day one

  • Include people management in your recovery plan

  • Coordinate with third parties and partners

  • Have a strong resilience posture

  • Perform frequent threat analyses.

  • Automate your data backup

 

Conclusion

A network disaster recovery plan should be there for any business regardless of size. Yes, the recovery plan cost money, time and effort but it is worth it because no one knows when a disaster will occur. Without a recovery plan, everything can be lost for Cyber Infrastructure.

References

Ismael, O.A., FireEye Inc, 2017. System, apparatus, and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection. U.S. Patent 9,736,179

Mishra, S., Anderson, K., Miller, B., Boyer, K., and Warren, A., 2020. Microgrid resilience: A holistic approach for assessing threats, identifying vulnerabilities, and designing corresponding mitigation strategies. Applied Energy264, p.114726

Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E. and Yang, C., 2018. The blockchain as a decentralized security framework [future directions]. IEEE Consumer Electronics Magazine7(2), pp.18-21

No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free

New Special Offer

Get 25% Off

best-assignment-experts-review

Call Back