研究生: |
孟悅然 Ntokozo Peter Mngometulu |
---|---|
論文名稱: |
Business Continuity Plan for a University Lab Network |
指導教授: |
孫宏民
Hung-Min Sun |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 英文 |
論文頁數: | 85 |
中文關鍵詞: | Business Continuity Plan 、Disater 、Prioritization |
相關次數: | 點閱:22 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
Abstract
As more companies and institutions become dependent on information technology (IT)
infrastructure, the more the risk of interruption expands. In the past, business continuity
and disaster recovery planning weren't necessarily a priority for higher education
institutions. Due to recent events, however, colleges and universities are increasingly
developing plans to enable their business functions to continue in the face of a disruptive
event. To facilitate this planning, many are exploring the use of business continuity
planning tools, which establish a planning framework, offer direction in the planning
process, and provide a common platform for the various campus groups involved. This
thesis presents a better way of documenting, testing and evaluating a business continuity
plan with a major focus on network continuity in a university laboratory environment,
and the adoption of such a document is believed will greatly ensure survivability of the
network in case of a disaster for the lab.
References
[1] H. Baltazar, "CDP wares aid tape backup," in Business Source Premier Database, Eweek
22 pS1-S4, September 29, 2005.
[2] E. Beser, "A guide to the perplexed business owner: Helping your business survive the
unexpected Shutdown," ennovate inc, 2004.
[3] J. Botha and R. V. Solms, "A cyclic approach to business continuity planning," in
Information Management & Computer Security. vol. 12 No. 4: Emerald Group Publishing
Limited, 2004, pp. 328 - 337.
[4] H. Cervone, "Disaster recovery and continuity planning for digital library systems," OCLC
Systems & Services: International digital library perspectives, vol. 22 No. 3, pp. 173-178,
2006.
[5] I. Chengalur-Smith, S. Belardo, and H. Pazer, "Adopting a Disaster-Management-Based
Contingency Model to the Problem of Ad Hoc Forecasting: Toward Information
Technology-Based Strategies," IEEE Trans. Eng. Management, vol. vol. 46, pp. 210-220,
May 1999.
[6] K. Doughty, "Business continuity planning: Protecting your organization’s life,"
Introduction. In K. Doughty (Ed.), pp. xi-xix, 2001.
[7] C. Guelke, "A strategic approach to disaster preparedness," in Engineering Management
Conference, 2005. Proceedings. 2005 IEEE International, 2005, pp. 745- 750.
[8] R. Krock, "Effective quality control during disaster recovery," Bell Labs Technical Journal
9, vol. 2, pp. 163-171, 2004.
[9] HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00224567/c00224567.pdf
[10] http://www.mynetsec.com/book/export/html/4
[11] ISO/IEC 27001:2005, Information technology -- Security techniques -- Information
security management systems -- Requirements, 2005.
[12] B. Murphy and M. Davis, "Enterprise Risk Management," KPMG LLP, the Canadian
member firm of KPMG International, a Swiss association, 2001.
http://www.kpmg.ca/en/services/advisory/err/documents/enterpriseriskmanagement.pdf
[13] Norfolk County Council and Shropshire Fire & Rescue Service, “Business Continuity
Planning: For Small to Medium-Sized Businesses and the Voluntary Organisations”, in
Shropshire County Council, 2007.
[14] C. P. Pfleeger and S. L. Pfleeger, Security in Computing, 3rd ed.: Prentice Hall Professional
Technical Reference, 2003.
[15] B. M. Shao, "Optimal Redundancy Allocation for Information Technology Disaster
Recovery in the Network Economy," IEEE Transaction on Dependable and Secure
Computing, vol. 2, September 2005.
[16] Stallings W., “Cryptography and Network Security Principles and Practices”,
Prentice Hall, 3rd Edition, 2003.
[17] The Information Security Glossary at: http://www.yourwindow.to/informationsecurity/
gl_confidentialityintegrityandavailabili.htm
[18] J. W. Toigo, Disaster Recovery Planning, 3rd ed.: Prentice Hall, 2003.
[19] J. W. Toigo, "The joy of data replication in 2004," 2003., at :
http://searchstorage.techtarget.com/tip/1,289483,sid5_gci942767,00.htm
[20] V. Wheatman, “Aftermath: disaster recovery”, Gartner Research, AV-14-5238, 2001.