Verified Document

Data Backup, Recovery, And Business Continuity At Google Essay

Strategic Plan for Google The following is an outline of the strategic plan for Google that provides insights into the organizational activities, competitiveness, and performance.

Executive summary of the business plan of Google

Google

The mission statement of Google

Corporate Culture of Google

Historical Development, Performance, and Results of Google

Management and the Leadership Structure of Google

Situational Analysis of Google (SWOT) Analysis

Strengths of Google

Weaknesses of Google

Opportunities of the Company

Threats Facing the Performance and Competitiveness of Google

Market Research of Google

Competition and Competitiveness of Google

Clients or Customers Utilizing the Services Provided by Google

Other factors that affect the performance and the competitiveness of the company

Marketing Goals of Google

Consumer Awareness

Market Share of Google

Diversification Strategies Adopted by Google

Channels of Distribution Used by the Company

6. Service Development Within Google

Description of Services offered by the Company

Pricing Strategies Adopted by the Company

Service Delivery Systems

Service Delivery Capability

Suppliers of the Important Elements that Influence the Performance of the Company

7. Marketing Plan of Google

Strategies and Tactics Used to Execute Organizational Marketing Strategies

Customer Segmentation

Positioning of the Services Offered in the Marketplace

Advertising

Relations with the Public

Test Marketing

8. Risk Factors that Face Google

Shortfall in its Revenue

Negative Legislation

Global Economic Recession

Competition

Technology

Adverse Publicity

Constantly Changing Global Policies on Consumer Protection and Organizational Legal requirements

Disaster Recovery Plan of Google

Objective of the Disaster Recovery Plan

The key objective of the disaster recovery plan of Google is to restore back the normal functioning of the affected system and recover lost information to ensure the normal running of organizational activities.

Disaster Recovery Plan

1. Seeking for approval from the top management of the company for the recovery process to begin as it ensures acquisition of the required resources for the process

2. Coming up with the planning committee to take the responsibility of developing the actual recovery plans for the organizational problem

3. Performing risk assessment on the affected systems to analyze the nature and extent of the damage to the organizational information storage system

4. Developing priorities-, this entails deciding on the organizational systems that should be resolved immediately to ensure the normal running of organizational activities. Prioritizing allows for the concentration of the organizational resources for managing the disaster.

5. Developing recovery systems- the stage entails determining the method for backing up the hardware, communications, software, operations, files, and services within the organization. The process determines the rate of the disaster recovery process.

6. Data identification- this entails protecting the data that should be protected from further loss during the event, thereby, safe recovery of the lost information after the disaster. Such includes inventory statistics of the company, insurance policies, and list of prospective vendors of the company (Fulmer, 2005).

7. Creating a written plan-, the written plan provides an outline of the data that should be accounted for and ways of recovering it.

8. Creating a backup plan for ensuring a successful recovery after the disaster and protection of organizational information

9. Test the developed recovery plan- testing ensures its success when used in responding to the present and future disasters likely to affect the normal functioning of the company.

10. Plan approval- the committee approves the plan after it proves effective in protecting further loss of organizational information and system inefficiency (de Guise, 2008).

Data backup

It is beyond doubt that Google generates an enormous amount of data and information files that keep changing constantly on a daily basis. The large volume of data increases its vulnerability to los, corruption, stolen, or compromised by access by third parties. Similarly, failures such a hardware, malware, hacking, and human error can also result in a significant loss...

Loss of organizational data costs organizations significantly. As such, integrating data backup and data recovery into the business continuity plan of the company is imperative. The development of the data backup plan for the company begins with the identification of the data to be backed up, selecting the software and hardware for use, and implementing the procedures required to see the success of the backup process. Developing data backup plan for Google entails the identification of data on various devices such as desktops, network servers, and wireless devices that should be backed up. Hard copy materials are packed using methods such as scanning the papers into digital formats that can be stored easily and packed with the digital data (Wallace, Webber, & Webber, 2011).
Google uses a variety of methods for backing up its data. Among them include the use of cartridges, USB drivers with large capacities, tapes, and integrated backup software. The storage of the data takes into consideration the need for the same storage as the original data of the organization. Similarly, the company has embraced online methods of data backup over the recent past to ensure enhanced security (de Guise, 2008). For instance, the company has embraced the use of the "cloud" technology to ensure effective and safe storage of organizational information. The technology relies on the use of software in the computers of the company that backs information automatically. Data backing is done regularly to ensure ease identification of lost data and adoption of the necessary steps to recover and prevent future occurrences of similar events (Fulmer, 2005).

Data recovery

Data recovery refers to a process whereby an organization salvages data from damaged, corrupted, failed, or inaccessible secondary methods of storing the data. The ease of data recovery varies from one system to another depending on the complexity associated with the recovery process. Data recovery process used in Google occurs in four main stages that encompass the above-discussed phases of disaster recover. Among the steps, include repairing of the affected hard drive, imaging the drivers into a new disk or drive, logical recovery of files, and repairing the damaged files during the process. Data recovery allows for the adoption of anticipatory measures to loss of different organizational components such as the environment of the computer room, hardware within the company, software applications, connections to the devices, and data and restoration centers (Snedaker, 2007).

In addition, Google has developed internal controls for data recovery that aims at ensuring effective coordination of the recovery processes. The internal controls work under the principle of configuring hardware to use similar software applications, thereby, uniform storage of organizational information. A number of vendors also provide the company with hot sites for recovery the lost data. The hot sites are configured to host data security, streams, and applications that can be managed easily within the organization (de Guise, 2008). The vendors also provide the company with data detection and filtering of threats arising from malware, thereby, enhancing security of organizational data. Developing disaster recovery plan for the company starts with the compilation of the inventory hardware, data, and software applications that are vulnerable to access by third parties. As such, combining these efforts ensure effective management of organizational data and safety (Fulmer, 2005).

Business continuity plan

Continuity of organizational activities affects the analysis of its operations, thereby, disrupting organizational functions and processes. The plan allows the company to identify internal and external threats that are likely to affect the performance and the realization of the desired goals of the organization. The continuity plan encompasses various activities such as alternatives for recovering from different disasters that alter the normal running of organizational activities. Similarly, the systems of ensuring continuity of business plan allows for the breaking down of malware and threats that are likely to affect the normal functioning of the organizational systems. The success of the business continuity plan used by Google relies on different forms of business analysis such as impact, threat, and analysis of impact scenarios. Impact analysis allows the company to differentiate between the urgent and non-urgent organizational functions that should managed by the adoption of the designed recovery strategies (Snedaker, 2007).

Risk and threat analysis focuses on the identification of the most effective response strategies that can be used to eliminate each disaster facing the company. As such, it employs the use of varied recovery strategies unique for each of the threats identified (Wallace, Webber, & Webber,…

Sources used in this document:
References

de Guise, P. (2008). Enterprise Systems Backup and Recovery: A Corporate Insurance Policy. London: CRC Press

Fulmer, K.L. (2005). Business Continuity Planning: A Step-by-step Guide with Planning Forms on CD-ROM. New York: Rothstein Associates Inc.

Snedaker, S. (2007). Business continuity & disaster recovery for IT professionals. Burlington, MA: Syngress

Wallace, M., Webber, L., & Webber, L. (2011). The Disaster Recovery Handbook: A Step-by-step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets. New York: AMACOM Div American Mgmt Assn
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing and Computing
Words: 7745 Length: 25 Document Type: Thesis

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.

Information Technology Portfolio Project Humana
Words: 2919 Length: 9 Document Type: Thesis

The first time that they attempted to build this system they did not follow the life cycle plan and the system ended up failing. Developing a new claims payment system that will talk to and be user friendly with the customer service management system would help to speed up efficiency and enhance quality of all departments within the organization. This streamlining would help the company as a whole to

Cracking the Code the Contemporary Issue of
Words: 3543 Length: 12 Document Type: Essay

Cracking the Code The contemporary issue of physical security/IT security Modern day businesses and organizations face the contemporary issue of physical security/IT security. Whether a business needs to maintain network security for a website or server, or an organization needs to restrict access to a server room, there are several aspects facing the problem of dealing with IT security. Any general computer networking instructor teaches the DOD and/or OSI networking models and

Tonys Chip Website Migration Project
Words: 2848 Length: 12 Document Type: Essay

Migration Project for Tony's Chip The focus of this document is to develop an internally hosted Website Migration Project for Tony's Chip Company. The website will have a back-up site that will serve as a failover in case the original site goes down or unavailable. To assist Tony's Chip Company building a dynamic Website that provides a disaster recovery plan, and minimal downtime to ensure that the site is available

Supply Chain Planning Under Uncertainty:
Words: 12190 Length: 44 Document Type: Research Proposal

Results from the study by Petersen, Ragatz and Monczka show that effective collaborative planning depends on information quality, and the trust level firms share. The authors purport: "Collaborative planning activities between supply chain partners are expected to lead to better performing supply chains" (Petersen, Ragatz & Monczka, Introduction section ¶ 1). In addition, numerous other researchers have also explored the perception relating to supplier alliances, that enhanced collaborative planning

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now