跳到主要內容

臺灣博碩士論文加值系統

(44.192.38.248) 您好!臺灣時間:2022/11/27 06:49
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:孟悅然
研究生(外文):Ntokozo Peter Mngometulu
論文名稱:BusinessContinuityPlanforaUniversityLabNetwork
指導教授:孫宏民
指導教授(外文):Hung-Min Sun
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊系統與應用研究所
學門:電算機學門
學類:系統設計學類
論文種類:學術論文
畢業學年度:95
語文別:英文
論文頁數:85
中文關鍵詞:Business Continuity PlanDisaterPrioritization
相關次數:
  • 被引用被引用:0
  • 點閱點閱:106
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
Abstract
As more companies and institutions become dependent on information technology (IT)
infrastructure, the more the risk of interruption expands. In the past, business continuity
and disaster recovery planning weren't necessarily a priority for higher education
institutions. Due to recent events, however, colleges and universities are increasingly
developing plans to enable their business functions to continue in the face of a disruptive
event. To facilitate this planning, many are exploring the use of business continuity
planning tools, which establish a planning framework, offer direction in the planning
process, and provide a common platform for the various campus groups involved. This
thesis presents a better way of documenting, testing and evaluating a business continuity
plan with a major focus on network continuity in a university laboratory environment,
and the adoption of such a document is believed will greatly ensure survivability of the
network in case of a disaster for the lab.
Table of Contents

CHAPTER 1: Introduction…………….…………………………………....

1.1 Synopsis of Prioritization in BCP ...…….……………………………..........
1.2 Related Work ……………..…………………….……………………..........
1.2.1 Disaster Recovery and Continuity Planning for Digital Library...
1.2.2 Risk Assessment………………………………………………....
1.3 Organization of this Thesis…………………..……………………………...
1.4 Limitations of the Research………………….……………………………...
1.5 Research Questions …….…………………………………………………..
1.6 Our contribution…………………………………………………………….
1.7 Purpose of Research………………………………………………………...

CHAPTER 2: Background and Literature Review…………………………....

2.1 Disaster Recovery Plan……………………………………………………....
2.2 Security Planning …………………………………………………………....
2.2.1 Contents of a Security Plan ……………………………………...
2.2.1.1 Security Policy …………………………………………..
2.2.1.2 Confidentiality, Integrity and Availability ……………..

CHAPTER 3: Methodology and Design………………………………………………

3.1 Scope of Plan……..…………….………………………..…………………..
3.2 Objectives of the Plan…..…………….……………………………………...
3.3 Assumptions to our BCP………….…………………………….....................
3.4 Our BCP development cycle.………………………………………...............
3.5 Our BCP policy………………………..………………………......................
3.5.1 Operational continuity Plan.………..………………………........
3.6 Framework for our BCP ……………………………………………………

CHAPTER 4: Specifications…………………………………………………………...

4.1 Functional Specifications………………………………………....................
4.2 Technical Specifications…………………………………………………….
4.3 Acceptance Specifications ………………………………………………….
4.4 Testing Specifications……………………………………………………….


CHAPTER 5: Implementation Testing and Evaluation…………………………….

5.1 Implementation Phase………………………………………………………
5.1.1 Prioritization Scheme ……………………………………………
5.1.2 Mapping critical functions to resources ……………………........
5.1.3 Solution and design of the Mail, Internet and FTP Servers continuity plan …………………………………………………..
5.2 The Business Continuity Plan Document for a University Lab Network ….
5.2.1 Detail of the lab and Emergency numbers ………………………
5.2.2 BCP Team ……………………………………………………….
5.2.3 External Emergency Services …………………………………...
5.2.4 Lab Members contact list ………………………………………..
5.2.5 Key Lab Functions ………………………………………………
5.2.6 Vendors and Suppliers …………………………………………..
5.2.6.1 Computer ……………………………………………......
5.2.6.2 Software ………………………………………………....
5.2.6.3 Services ……………………………………………….....
5.2.7 Emergency Evacuation Procedures ……………………………..
5.2.8 Post Disaster Action Plan ……………………………………….
5.3 Standard Operating Procedures (SOP) for a Lab Services………….……....
5.3.1 Standard Operating Procedures for the Printing Service………...
5.4 Testing Results ……………………………………………………………..
5.5 Evaluation and Analysis …………………………………………………...

CHAPTER 6: Recommendations………………………………………………….

6.1 Inspiration and Perspiration for BCP ……………………………………….
6.2 Consequences………………………………………………………………..
6.3 Management…………………………………………………………………
6.4 Maintenance…………………………………………………………………
6.5 Security……………………………………………………………………...
CHAPTER 7: Conclusion and Future Work………………………………………...

7.1 Conclusion …………….………………………………………………........
7.2 Future Work…………….…………………………………………………...

REFERENCES………………………………………………………………………….

APPENDIX A ………………………………………………………………………......

APPENDIX B ………………………………………………………………………......
1

3
4
4
5
6
7
7
8
9

10

12
12
13
13
14

17

17
17
17
18
25
26
28

30

30
30
31
32


33

33
33
38

40
42
42
43
44
44
46
48
48
49
50
52
53
55
55
70
71

73

73
74
74
74
75

76

76
77

78

81

85
References
[1] H. Baltazar, "CDP wares aid tape backup," in Business Source Premier Database, Eweek
22 pS1-S4, September 29, 2005.
[2] E. Beser, "A guide to the perplexed business owner: Helping your business survive the
unexpected Shutdown," ennovate inc, 2004.
[3] J. Botha and R. V. Solms, "A cyclic approach to business continuity planning," in
Information Management & Computer Security. vol. 12 No. 4: Emerald Group Publishing
Limited, 2004, pp. 328 - 337.
[4] H. Cervone, "Disaster recovery and continuity planning for digital library systems," OCLC
Systems & Services: International digital library perspectives, vol. 22 No. 3, pp. 173-178,
2006.
[5] I. Chengalur-Smith, S. Belardo, and H. Pazer, "Adopting a Disaster-Management-Based
Contingency Model to the Problem of Ad Hoc Forecasting: Toward Information
Technology-Based Strategies," IEEE Trans. Eng. Management, vol. vol. 46, pp. 210-220,
May 1999.
[6] K. Doughty, "Business continuity planning: Protecting your organization’s life,"
Introduction. In K. Doughty (Ed.), pp. xi-xix, 2001.
[7] C. Guelke, "A strategic approach to disaster preparedness," in Engineering Management
Conference, 2005. Proceedings. 2005 IEEE International, 2005, pp. 745- 750.
[8] R. Krock, "Effective quality control during disaster recovery," Bell Labs Technical Journal
9, vol. 2, pp. 163-171, 2004.
[9] HP website at: http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00224567/c00224567.pdf
[10] http://www.mynetsec.com/book/export/html/4
[11] ISO/IEC 27001:2005, Information technology -- Security techniques -- Information
security management systems -- Requirements, 2005.
[12] B. Murphy and M. Davis, "Enterprise Risk Management," KPMG LLP, the Canadian
member firm of KPMG International, a Swiss association, 2001.
http://www.kpmg.ca/en/services/advisory/err/documents/enterpriseriskmanagement.pdf
[13] Norfolk County Council and Shropshire Fire & Rescue Service, “Business Continuity
Planning: For Small to Medium-Sized Businesses and the Voluntary Organisations”, in
Shropshire County Council, 2007.
[14] C. P. Pfleeger and S. L. Pfleeger, Security in Computing, 3rd ed.: Prentice Hall Professional
Technical Reference, 2003.
[15] B. M. Shao, "Optimal Redundancy Allocation for Information Technology Disaster
Recovery in the Network Economy," IEEE Transaction on Dependable and Secure
Computing, vol. 2, September 2005.
[16] Stallings W., “Cryptography and Network Security Principles and Practices”,
Prentice Hall, 3rd Edition, 2003.
[17] The Information Security Glossary at: http://www.yourwindow.to/informationsecurity/
gl_confidentialityintegrityandavailabili.htm
[18] J. W. Toigo, Disaster Recovery Planning, 3rd ed.: Prentice Hall, 2003.
[19] J. W. Toigo, "The joy of data replication in 2004," 2003., at :
http://searchstorage.techtarget.com/tip/1,289483,sid5_gci942767,00.htm
[20] V. Wheatman, “Aftermath: disaster recovery”, Gartner Research, AV-14-5238, 2001.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文