簡易檢索 / 詳目顯示

研究生: 孟悅然
Ntokozo Peter Mngometulu
論文名稱: Business Continuity Plan for a University Lab Network
指導教授: 孫宏民
Hung-Min Sun
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2007
畢業學年度: 95
語文別: 英文
論文頁數: 85
中文關鍵詞: Business Continuity PlanDisaterPrioritization
相關次數: 點閱:22下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Abstract
    As more companies and institutions become dependent on information technology (IT)
    infrastructure, the more the risk of interruption expands. In the past, business continuity
    and disaster recovery planning weren't necessarily a priority for higher education
    institutions. Due to recent events, however, colleges and universities are increasingly
    developing plans to enable their business functions to continue in the face of a disruptive
    event. To facilitate this planning, many are exploring the use of business continuity
    planning tools, which establish a planning framework, offer direction in the planning
    process, and provide a common platform for the various campus groups involved. This
    thesis presents a better way of documenting, testing and evaluating a business continuity
    plan with a major focus on network continuity in a university laboratory environment,
    and the adoption of such a document is believed will greatly ensure survivability of the
    network in case of a disaster for the lab.


    Table of Contents CHAPTER 1: Introduction…………….………………………………….... 1.1 Synopsis of Prioritization in BCP ...…….…………………………….......... 1.2 Related Work ……………..…………………….…………………….......... 1.2.1 Disaster Recovery and Continuity Planning for Digital Library... 1.2.2 Risk Assessment……………………………………………….... 1.3 Organization of this Thesis…………………..……………………………... 1.4 Limitations of the Research………………….……………………………... 1.5 Research Questions …….………………………………………………….. 1.6 Our contribution……………………………………………………………. 1.7 Purpose of Research………………………………………………………... CHAPTER 2: Background and Literature Review………………………….... 2.1 Disaster Recovery Plan…………………………………………………….... 2.2 Security Planning ………………………………………………………….... 2.2.1 Contents of a Security Plan ……………………………………... 2.2.1.1 Security Policy ………………………………………….. 2.2.1.2 Confidentiality, Integrity and Availability …………….. CHAPTER 3: Methodology and Design……………………………………………… 3.1 Scope of Plan……..…………….………………………..………………….. 3.2 Objectives of the Plan…..…………….……………………………………... 3.3 Assumptions to our BCP………….……………………………..................... 3.4 Our BCP development cycle.………………………………………............... 3.5 Our BCP policy………………………..………………………...................... 3.5.1 Operational continuity Plan.………..………………………........ 3.6 Framework for our BCP …………………………………………………… CHAPTER 4: Specifications…………………………………………………………... 4.1 Functional Specifications……………………………………….................... 4.2 Technical Specifications……………………………………………………. 4.3 Acceptance Specifications …………………………………………………. 4.4 Testing Specifications………………………………………………………. CHAPTER 5: Implementation Testing and Evaluation……………………………. 5.1 Implementation Phase……………………………………………………… 5.1.1 Prioritization Scheme …………………………………………… 5.1.2 Mapping critical functions to resources ……………………........ 5.1.3 Solution and design of the Mail, Internet and FTP Servers continuity plan ………………………………………………….. 5.2 The Business Continuity Plan Document for a University Lab Network …. 5.2.1 Detail of the lab and Emergency numbers ……………………… 5.2.2 BCP Team ………………………………………………………. 5.2.3 External Emergency Services …………………………………... 5.2.4 Lab Members contact list ……………………………………….. 5.2.5 Key Lab Functions ……………………………………………… 5.2.6 Vendors and Suppliers ………………………………………….. 5.2.6.1 Computer ……………………………………………...... 5.2.6.2 Software ……………………………………………….... 5.2.6.3 Services ………………………………………………..... 5.2.7 Emergency Evacuation Procedures …………………………….. 5.2.8 Post Disaster Action Plan ………………………………………. 5.3 Standard Operating Procedures (SOP) for a Lab Services………….…….... 5.3.1 Standard Operating Procedures for the Printing Service………... 5.4 Testing Results …………………………………………………………….. 5.5 Evaluation and Analysis …………………………………………………... CHAPTER 6: Recommendations…………………………………………………. 6.1 Inspiration and Perspiration for BCP ………………………………………. 6.2 Consequences……………………………………………………………….. 6.3 Management………………………………………………………………… 6.4 Maintenance………………………………………………………………… 6.5 Security……………………………………………………………………... CHAPTER 7: Conclusion and Future Work………………………………………... 7.1 Conclusion …………….………………………………………………........ 7.2 Future Work…………….…………………………………………………... REFERENCES…………………………………………………………………………. APPENDIX A ………………………………………………………………………...... APPENDIX B ………………………………………………………………………...... 1 3 4 4 5 6 7 7 8 9 10 12 12 13 13 14 17 17 17 17 18 25 26 28 30 30 30 31 32 33 33 33 38 40 42 42 43 44 44 46 48 48 49 50 52 53 55 55 70 71 73 73 74 74 74 75 76 76 77 78 81 85

    References
    [1] H. Baltazar, "CDP wares aid tape backup," in Business Source Premier Database, Eweek
    22 pS1-S4, September 29, 2005.
    [2] E. Beser, "A guide to the perplexed business owner: Helping your business survive the
    unexpected Shutdown," ennovate inc, 2004.
    [3] J. Botha and R. V. Solms, "A cyclic approach to business continuity planning," in
    Information Management & Computer Security. vol. 12 No. 4: Emerald Group Publishing
    Limited, 2004, pp. 328 - 337.
    [4] H. Cervone, "Disaster recovery and continuity planning for digital library systems," OCLC
    Systems & Services: International digital library perspectives, vol. 22 No. 3, pp. 173-178,
    2006.
    [5] I. Chengalur-Smith, S. Belardo, and H. Pazer, "Adopting a Disaster-Management-Based
    Contingency Model to the Problem of Ad Hoc Forecasting: Toward Information
    Technology-Based Strategies," IEEE Trans. Eng. Management, vol. vol. 46, pp. 210-220,
    May 1999.
    [6] K. Doughty, "Business continuity planning: Protecting your organization’s life,"
    Introduction. In K. Doughty (Ed.), pp. xi-xix, 2001.
    [7] C. Guelke, "A strategic approach to disaster preparedness," in Engineering Management
    Conference, 2005. Proceedings. 2005 IEEE International, 2005, pp. 745- 750.
    [8] R. Krock, "Effective quality control during disaster recovery," Bell Labs Technical Journal
    9, vol. 2, pp. 163-171, 2004.
    [9] HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00224567/c00224567.pdf
    [10] http://www.mynetsec.com/book/export/html/4
    [11] ISO/IEC 27001:2005, Information technology -- Security techniques -- Information
    security management systems -- Requirements, 2005.
    [12] B. Murphy and M. Davis, "Enterprise Risk Management," KPMG LLP, the Canadian
    member firm of KPMG International, a Swiss association, 2001.
    http://www.kpmg.ca/en/services/advisory/err/documents/enterpriseriskmanagement.pdf
    [13] Norfolk County Council and Shropshire Fire & Rescue Service, “Business Continuity
    Planning: For Small to Medium-Sized Businesses and the Voluntary Organisations”, in
    Shropshire County Council, 2007.
    [14] C. P. Pfleeger and S. L. Pfleeger, Security in Computing, 3rd ed.: Prentice Hall Professional
    Technical Reference, 2003.
    [15] B. M. Shao, "Optimal Redundancy Allocation for Information Technology Disaster
    Recovery in the Network Economy," IEEE Transaction on Dependable and Secure
    Computing, vol. 2, September 2005.
    [16] Stallings W., “Cryptography and Network Security Principles and Practices”,
    Prentice Hall, 3rd Edition, 2003.
    [17] The Information Security Glossary at: http://www.yourwindow.to/informationsecurity/
    gl_confidentialityintegrityandavailabili.htm
    [18] J. W. Toigo, Disaster Recovery Planning, 3rd ed.: Prentice Hall, 2003.
    [19] J. W. Toigo, "The joy of data replication in 2004," 2003., at :
    http://searchstorage.techtarget.com/tip/1,289483,sid5_gci942767,00.htm
    [20] V. Wheatman, “Aftermath: disaster recovery”, Gartner Research, AV-14-5238, 2001.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE