3 1
3 1
not, responds to any disruptive attack, which could be cyber attack, natural disasters or
more. The results of these could impact the organization as a whole as it could lose the
customers trust, the authority of the organization, confidential data and financial loss.
The plan has strategies which allow minimization of the impacts of a disaster and
allows the IBM organization to continue its business operations efficiently. Moreover,
before the creation of a disaster recovery plan, IBM performed a business impact
analysis and a risk analysis.
Backup is basically keeping all the vital data for the workload that the organization is
running on. It could be documents, configuration files, and media files/images.
1. Fully mirrored site: This is the backup technique where the operations can
be transferred the same way like how it was at the official site, so the data
which is used and processed can be retrieved easily where there has been a
disaster. This backup technique is the most expensive out of all.
2. Warm Site: This technique is somewhat like a hot site. These are partially
equipped, and so they assist normal operations for functions which are not
critical which are then taken over by IT to resume the operations.
3. Cold Site: This site is the one which is put instantly after an attack. Proper
planning has not been done here, and there is no standby. A cold site gives
the slowest time of recovery and the organization will go through
repercussions.
4. Cloud Based Recovery Site: This is the go-to backup technique for various
organizations as they store the important data in cloud storage. There is no
need for installation of physical equipment for the server since it can be
handled by the cloud host.
5. RAID: This consists of ways to store the data in various hard drives and
put together as 1 unit. It assists users to store the backups of the confidential
data if 1 of them fails and then helps improve the efficiency of the drives.
8. Electronic Vaulting: This means that the data is backed up and the output is
transmitted to a secure location which is offsite electronically.
It is vital for IBM to have data backup strategies available and ongoing since it
ensures that the organization has the complete copy of the systems in case of a disaster
or a cyber-attack, and the data would be ready to restore no matter the case of loss.
Key Steps:
Step 1: The initial step is to outline the major goals of the plan
Step 2: The second step is to have a personnel record plan which includes the copy of
the organization chart alongside the disaster recovery plan.
Step 3: Various applications should be listed and whether they are vital and need
assets or not.
Step 4: The inventory profile which is the manufacturer, model, serial number, and if
the item is owned or not.
Step 5: Service backups procedures include data such as the modification of the
services done within the organization.
Step 7: The plan for a mobile setup includes a communication disaster plan along with
wiring and electrical diagrams.
Step 8: A hot site plan should be made as a sort of an alternative backup site. This is
for temporary utilization.
Step 9: Restorage of the system the way it was before the disaster had taken place.
Step 10: The reconstruction and rebuilding of the data center must be assessed and
then put in place.
Step 11: Using contingency planning to test the disaster recovery plan in order to
evaluate and assess it.
Crisis Management
It is vital to know IBM’s own vulnerabilities which involves organizational audits and
technical and security loopholes. Determining events which could have the most
disrupting impact is also important to recognize in order to avoid and be ready for it.
Anticipatory measures within IBM would be to minimize the risks that could occur
and be prepared. Upstream simulations should be carried out in order the determine
any attack and respond with appropriate measures.
A risk analysis should be conducted for IBM as to evaluate and determine the risks
which could effect it. After which, a crisis management policy and documentary kit is
to be put in place. The documentary kit contains defense plans, trigger matrix, reflex
cards, checklists and legal documents, all of which would be beneficial towards IBM.
IBM has 2 multidisciplinary units, one of which is decisional, and it determines which
response strategy is to be adapted whilst minimizing the impact on IBM and the other
is tactical which coordinates the response by the decisions.
In other words, these are simulations of the cyber attack. These are necessary for
different aims ranging from educational purposes towards IBM employees to a
alerting them. These help to prepare for further future attacks.
Create realistic crisis scenarios
These scenarios are created in order to be ready for what may come ahead. It should
be made in a way that all departments within the organization can come into action.
IBM’s crisis scenarios can be based on leakage of personal data or extortion in order
to educate and involve all employees to do their part.
Problematic Event or incident Affected Business Processes Impact Classification & Effect on
finance, legal and reputation
IT department 5 hour 7 hours All servers since High priority at all Mission
everything is times. critical
connected to the IT
department.
Employees data
Criticality Ratings
Mission Critical 4
Important 3
Medium 2
Minor 1