Shockerthon Disaster Recovery Plan

Improved Essays
Disaster Recovery Plan Wichita State Shockerthon is a company focused on creating awareness and support by raising money for the Children’s Miracle Network. Shockerthon uses a database to store many of our clients personal medical information, donor emails, and supporter credit card/debit card information. It is important that Shockerthon creates a plan of action incase the information system is threatened. These threats could arise from natural disasters, security breaches or a virus. Although Shockerthon may not be comparable to Koch Industries, in size, it is imperative to have a plan for any situation concerning the threat of information systems as risking personal information may discredit the reputation Shockerthon has built for itself. …show more content…
Shockerthon aims to recover back to normal operation hours within 24 hours. When working with sensitive information such as receiving donations directly through credit/debit cards, sending donation receipts, and keeping in contact with current and future donors it is important to have our systems operating back to normal as soon as possible. After setting a time frame for information loss or disaster recovery, it is on to creating point objectives to outline how the backup should operate.
When setting the recovery point objectives, it is important to consider that the primary use for the Shockerthon Database. The Shockerthon Database is used to reference client information, calculate growth by donations and money collected from fundraising efforts, and also sending donation receipts. While understanding the primary use for Shockerthons Database, it is understood that once a week should be a sufficient amount data backed up. If the system backs itself up every week, it would save most vital data that could be lost since the documents are not revised all that

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Each employee should be held responsible for ensuring that their daily backup has taken place without any errors. If errors should arise, an IT Professional such as myself should be notified…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    It is very important to have a current and accurate data backup plan for emergency situations. Losing all of your data or maybe even just some of it could have dire consequences for the company. These consequences could be in the form of compliance infractions and come with steep fines all the way to laws suits for loosing customer data or classified information. Having the ability to restore this data if it is ever destroyed or compromised could save our company from losing all credibility and going bankrupt. Having a good data backup plan ensures that we will be able to restore our company in a disaster to an acceptable state of operation without losing much if any information necessary to keep our customers happy and business running…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The problem or the issue addressed is on how to parallelize the computation, distribute the data, and handle failures conspire to obscure the original simple computation with large amounts of complex code to deal with these issues. Contributions are simple powerful interface that gives parallelization and distribution of large scale systems. So to tackle the issue of parallelization, fault tolerance and distribution of data, they acquired the map and reduce primitives. The use of a functional model with user-specified map and reduce operations allows us to parallelize large computations easily and to use re-execution as the primary mechanism for fault tolerance.…

    • 868 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    As Maxistar Medical Supplies Company develops and extends operations it turns out to be progressively critical to keep IT operations secure while likewise empowering the business to rapidly and adequately address client issues. Amid a late appraisal Maxistar recognized a few changes that should have been be executed to their IT operations to secure their business to adjust to administrative and lawful consistency for the Payment Card Industry (PCI), HIPAA, and NIST 800-53 principles. As a major aspect of this evaluation, a few known dangers were recognized and 5 regions particularly were focused as the start of Maxistar's Security and Compliance program. This record will plot those dangers and the rules for our arrangement to carry Maxistar…

    • 164 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    “The vision of Tim Hoffman & Associates, LLC is to protect the world’s data and overall quality of life one customer at a time by providing the best quality service in the areas of cybersecurity, education, and consulting. Moreover, our aspiration is to keep the confidentially, integrity, and availability of our patron’s information as a central focus.”…

    • 57 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Terroristic activity is not a new concept here in the United States or in other countries plagued with high political turmoil. Terrorism is defined as the meaningful attempt of a smaller group or individual behaving irrationally with sadistic ideals who try to inflict their ways of thinking on a larger group or population. In every instance of terrorism, the tactics of fear and intimidation are always utilized (Schmallenger & Hall, 2014, p. 402). Terrorist organizations look for large areas with a booming population.…

    • 1447 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Case Study Assignment – I Campbellsville University MASSIVE DATABASE MASTERING - MASTERCARD INTERNATIONAL Various affiliations are endeavoring to address the open entryways and limit challenges related with "huge data." Industry masters gage that the total volume of data is increasing at general interims and most by a wide margin of new data being delivered is prepared to go spaces. MasterCard Universal (www.mastercard.com) is not any more impossible to miss to think about the issues identified with monstrous databases. MasterCard has amassed a data circulation focus that is more than 100-terabytes in size. Insiders expect that it will create to more than 1.8 petabytes.…

    • 933 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Recently UCLA was involved in a data breech in which hackers gained access to parts of UCLA Health's computer network where 4.5 million patient's sensitive information were accessed. This incident is a huge concern as it questions the ability of hospitals, health insurers and medical providers to safeguard the electronic medical records and other sensitive data that are collected. This network contained names, dates of birth, Social Security numbers, health plan identification numbers and medical information such as patient diagnoses. This access could have begun in September 2014 with some of the information dating back to 1990. Prior to the attack UCLA has been taking steps and spening tens of millions of dollars to strengthen its computer…

    • 154 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Humans are at the mercy of the computer; once it is down, there are no access to the information needed. While the computers can collect huge amounts of data, it can also collect huge…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Michelle Bentley's background includes: building and managing Information Security Department of 12 individual contributors, 15+ years of Information Security experience, 7+ years in Compliance, 8+ years of Project Management, Internal Audit, creating Security Programs, developing policies and risk mitigation plans, and promoting Security Management Practices. Currently, Bentley is building a Global Privacy and is also a Certified Information Security Manager…

    • 61 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Week 4 Assignment DRP BCP and different sites: Edmond Bessette Bellevue University Class CIS 608 Kayleen Amerson 9/22/2017 In this assignment I will compare and contrast Disaster recovery plan (DRP) to Business Continuity Planning (BCP) to understand when and how to use each one. BCP uses Hot Warm and Cold as backup sites. These sites are not referring to temperature of the rooms instead the required work to continue operations at these backup sites. (Whiteman 2017) Disaster recovery planning is the efforts of senior management to develop Disaster Recovery Plan, outline the recovery teams, and define incident.…

    • 544 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays