Verified Document

Data Backup, Recovery, And Business Continuity At Google Essay

Strategic Plan for Google The following is an outline of the strategic plan for Google that provides insights into the organizational activities, competitiveness, and performance.

Executive summary of the business plan of Google

Google

The mission statement of Google

Corporate Culture of Google

Historical Development, Performance, and Results of Google

Management and the Leadership Structure of Google

Situational Analysis of Google (SWOT) Analysis

Strengths of Google

Weaknesses of Google

Opportunities of the Company

Threats Facing the Performance and Competitiveness of Google

Market Research of Google

Competition and Competitiveness of Google

Clients or Customers Utilizing the Services Provided by Google

Other factors that affect the performance and the competitiveness of the company

Marketing Goals of Google

Consumer Awareness

Market Share of Google

Diversification Strategies Adopted by Google

Channels of Distribution Used by the Company

6. Service Development Within Google

Description of Services offered by the Company

Pricing Strategies Adopted by the Company

Service Delivery Systems

Service Delivery Capability

Suppliers of the Important Elements that Influence the Performance of the Company

7. Marketing Plan of Google

Strategies and Tactics Used to Execute Organizational Marketing Strategies

Customer Segmentation

Positioning of the Services Offered in the Marketplace

Advertising

Relations with the Public

Test Marketing

8. Risk Factors that Face Google

Shortfall in its Revenue

Negative Legislation

Global Economic Recession

Competition

Technology

Adverse Publicity

Constantly Changing Global Policies on Consumer Protection and Organizational Legal requirements

Disaster Recovery Plan of Google

Objective of the Disaster Recovery Plan

The key objective of the disaster recovery plan of Google is to restore back the normal functioning of the affected system and recover lost information to ensure the normal running of organizational activities.

Disaster Recovery Plan

1. Seeking for approval from the top management of the company for the recovery process to begin as it ensures acquisition of the required resources for the process

2. Coming up with the planning committee to take the responsibility of developing the actual recovery plans for the organizational problem

3. Performing risk assessment on the affected systems to analyze the nature and extent of the damage to the organizational information storage system

4. Developing priorities-, this entails deciding on the organizational systems that should be resolved immediately to ensure the normal running of organizational activities. Prioritizing allows for the concentration of the organizational resources for managing the disaster.

5. Developing recovery systems- the stage entails determining the method for backing up the hardware, communications, software, operations, files, and services within the organization. The process determines the rate of the disaster recovery process.

6. Data identification- this entails protecting the data that should be protected from further loss during the event, thereby, safe recovery of the lost information after the disaster. Such includes inventory statistics of the company, insurance policies, and list of prospective vendors of the company (Fulmer, 2005).

7. Creating a written plan-, the written plan provides an outline of the data that should be accounted for and ways of recovering it.

8. Creating a backup plan for ensuring a successful recovery after the disaster and protection of organizational information

9. Test the developed recovery plan- testing ensures its success when used in responding to the present and future disasters likely to affect the normal functioning of the company.

10. Plan approval- the committee approves the plan after it proves effective in protecting further loss of organizational information and system inefficiency (de Guise, 2008).

Data backup

It is beyond doubt that Google generates an enormous amount of data and information files that keep changing constantly on a daily basis. The large volume of data increases its vulnerability to los, corruption, stolen, or compromised by access by third parties. Similarly, failures such a hardware, malware, hacking, and human error can also result in a significant loss...

Parts of this document are hidden

View Full Document
svg-one

Loss of organizational data costs organizations significantly. As such, integrating data backup and data recovery into the business continuity plan of the company is imperative. The development of the data backup plan for the company begins with the identification of the data to be backed up, selecting the software and hardware for use, and implementing the procedures required to see the success of the backup process. Developing data backup plan for Google entails the identification of data on various devices such as desktops, network servers, and wireless devices that should be backed up. Hard copy materials are packed using methods such as scanning the papers into digital formats that can be stored easily and packed with the digital data (Wallace, Webber, & Webber, 2011).
Google uses a variety of methods for backing up its data. Among them include the use of cartridges, USB drivers with large capacities, tapes, and integrated backup software. The storage of the data takes into consideration the need for the same storage as the original data of the organization. Similarly, the company has embraced online methods of data backup over the recent past to ensure enhanced security (de Guise, 2008). For instance, the company has embraced the use of the "cloud" technology to ensure effective and safe storage of organizational information. The technology relies on the use of software in the computers of the company that backs information automatically. Data backing is done regularly to ensure ease identification of lost data and adoption of the necessary steps to recover and prevent future occurrences of similar events (Fulmer, 2005).

Data recovery

Data recovery refers to a process whereby an organization salvages data from damaged, corrupted, failed, or inaccessible secondary methods of storing the data. The ease of data recovery varies from one system to another depending on the complexity associated with the recovery process. Data recovery process used in Google occurs in four main stages that encompass the above-discussed phases of disaster recover. Among the steps, include repairing of the affected hard drive, imaging the drivers into a new disk or drive, logical recovery of files, and repairing the damaged files during the process. Data recovery allows for the adoption of anticipatory measures to loss of different organizational components such as the environment of the computer room, hardware within the company, software applications, connections to the devices, and data and restoration centers (Snedaker, 2007).

In addition, Google has developed internal controls for data recovery that aims at ensuring effective coordination of the recovery processes. The internal controls work under the principle of configuring hardware to use similar software applications, thereby, uniform storage of organizational information. A number of vendors also provide the company with hot sites for recovery the lost data. The hot sites are configured to host data security, streams, and applications that can be managed easily within the organization (de Guise, 2008). The vendors also provide the company with data detection and filtering of threats arising from malware, thereby, enhancing security of organizational data. Developing disaster recovery plan for the company starts with the compilation of the inventory hardware, data, and software applications that are vulnerable to access by third parties. As such, combining these efforts ensure effective management of organizational data and safety (Fulmer, 2005).

Business continuity plan

Continuity of organizational activities affects the analysis of its operations, thereby, disrupting organizational functions and processes. The plan allows the company to identify internal and external threats that are likely to affect the performance and the realization of the desired goals of the organization. The continuity plan encompasses various activities such as alternatives for recovering from different disasters that alter the normal running of organizational activities. Similarly, the systems of ensuring continuity of business plan allows for the breaking down of malware and threats that are likely to affect the normal functioning of the organizational systems. The success of the business continuity plan used by Google relies on different forms of business analysis such as impact, threat, and analysis of impact scenarios. Impact analysis allows the company to differentiate between the urgent and non-urgent organizational functions that should managed by the adoption of the designed recovery strategies (Snedaker, 2007).

Risk and threat analysis focuses on the identification of the most effective response strategies that can be used to eliminate each disaster facing the company. As such, it employs the use of varied recovery strategies unique for each of the threats identified (Wallace, Webber, & Webber,…

Sources used in this document:
References

de Guise, P. (2008). Enterprise Systems Backup and Recovery: A Corporate Insurance Policy. London: CRC Press

Fulmer, K.L. (2005). Business Continuity Planning: A Step-by-step Guide with Planning Forms on CD-ROM. New York: Rothstein Associates Inc.

Snedaker, S. (2007). Business continuity & disaster recovery for IT professionals. Burlington, MA: Syngress

Wallace, M., Webber, L., & Webber, L. (2011). The Disaster Recovery Handbook: A Step-by-step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets. New York: AMACOM Div American Mgmt Assn
Cite this Document:
Copy Bibliography Citation

Related Documents

Business Continuity Plan
Words: 1622 Length: 5 Document Type: Research Paper

Business Continuity Plan (U.S. VISIT-DHS) Internal Key Personnel and Backups The aim of this business continuity is to guarantee continuous business operations of the US_VISIT (DHS) whenever disasters strike. Through this business continuity plan, the company has higher chances of prevailing during the disasters or financial crisis. In times of crisis or emergency within operations, the following key personnel would retain their positions within the company. This indicates that they are extensive

Business Continuity and Disaster Recovery
Words: 2036 Length: 7 Document Type: Essay

Protection for employees If employees adhere to the rules of the acceptable use policy, there are less liable to questionable issues. This also prevents them from engaging in hazardous internet issues, for instance, they are less likely to disclose their contacts to crackers using social engineering approaches. Moreover, ABBA should settle on using universal guidelines and principles with respect to network security, it risk assessment, risk analysis, and risk management. In

Business Continuity Plan Testing and Auditing
Words: 707 Length: 2 Document Type: Research Paper

Business Auditing and Testing Business Auditing Testing and auditing is an essential of a business plan. Business plan is a blueprint followed in the successful launch or re launch an operation. It conveys the business prospects, growth and describes the product market. Business and auditing plan helps in preparedness of emergencies as a safety precaution for the continuity of a business. This planning ensures that services of a business continue when there

Business Continuity Planning Methodology Lindstrom,
Words: 479 Length: 2 Document Type: Article Review

This approach to creating cyclically-based strategies has helped to alleviate the time constraints on companies over time when it comes to managing the process of education and gaining senior management commitment. The smaller incremental gains made in these smaller organizations have actually proven to be more effective at deterring potential threats as knowledge is accumulated over time and change is gradual (Botha, Von Solms, 2004). The studies that are

Business Continuity Interview Analysis This Report Presents
Words: 511 Length: 2 Document Type: Essay

Business Continuity Interview Analysis This report presents the results of an interview conducted on February 24, 2012 with a medical office manager. More specifically, the office is a small joint practice of two Ear, Nose, and Throat (ENT) otolaryngologists. The interviewer inquired into the types of preparations, contingencies, and planning necessary for business continuity in the event of a major catastrophe that destroyed the office or that rendered it completely unusable

Business Continuity Why Does a
Words: 549 Length: 2 Document Type: Term Paper

A consistent method of communication must alert employees to any variations to the existing plan during the emergency that may need to take place, as every emergency is different. The absence of cellular phone or computer communication during some emergencies means that emergency communications equipment such as radio systems, public address systems, or portable radio may be necessary to notify employees of the emergency, to keep them informed, and for

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now