Short for disaster recovery plan, DRP is a plan for business continuity in the event of a disaster that destroys part or all of a business’s resources, including IT equipment, data records and the physical space of an organization.
Stages of a Disaster Recovery Plan
The goal of a DRP is to resume normal computing capabilities in as little time as possible. A typical DRP has several stages, including the following:
Understanding an organization’s activities and how all of its resources are interconnected.
Assessing an organization’s vulnerability in all areas, including operating procedures, physical space and equipment, data integrity and contingency planning.
Understanding how all levels of the organization would be affected in the event of a disaster.
Developing a short-term recovery plan.
Developing a long-term recovery plan, including how to return to normal business operations and prioritizing the order of functions that are resumed.
Testing and consistently maintaining and updating the plan as the business changes.
A key to a successful DRP is taking steps to preventing the likelihood of disasters from occurring, such as using a hot site or cold site to back up data archives.
In the last dozen years or so, we’ve seen a number of major disasters that highlight the importance of a well-thought-out disaster recovery plan (DRP).
Ransomware is a form of malware in which rogue software code effectively holds a user’s computer hostage until a “ransom” fee is paid. Ransomware often infiltrates a PC as a computer worm or Trojan horse that takes advantage of open security vulnerabilities. Most ransomware attacks are the result of clicking on an infected e-mail attachment […]
- IPv6 (IPng)
IPv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation) and it is the newest version of the Internet Protocol (IP) reviewed in the IETF standards committees to replace the current version of IPv4 (Internet Protocol Version 4). The official name of IPng is IPv6, where IP stands for Internet Protocol and […]
- Network Security
A specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have […]
- mobile broadband
The phrase used to describe Internet access (wireless communications) that is obtained through a portable modem or other device, such as a mobile phone. Different types of wireless network standards support a wide range of bandwidths but most are suitable for sending and receiving small bursts of data, such as e-mail and Web browsing, as […]
- data server
Data server is the phrase used to describe computer software and hardware (a database platform) that delivers database services. Also called a database server it also performs tasks such as data analysis, storage, data manipulation, archiving, and other tasks using client/server architecture.