Final paper | Computer Science homework help
1. Literature Review and Analysis
A. Importance of Structured Planning
Kesa, (2023) underscore the importance of structured disaster recovery and planning and continuity of operations especially in high stake industry such as the oil and gas industry. The study revealed the big benefits that organizations such as ADNOC Onshore receive from well documented, regularly updated DR and BC plans. Such plans make a response to crisis predictable and minimize the chances of operational standstill. According to Barnett-Quaicoo and Ahmadu 2021, the challenge organizations in the developing countries encounter are unique. From their analysis of Ghanaian firms, it is shown that infrastructure constraints and inconsistent regulatory enforcement usually defeat viable disaster recovery initiatives. It is suggested that regular audits and constant plan updates are necessary for solving these problems.
B. Access Control, and ACLs’ role
Access control is an important part of any DR or BC strategy. It decides the authority of access to certain data and systems. According to Sawalha, (2021), the ability to maintain effective role-based access control helps to increase trust from stakeholders and guarantees that recovery environments where only authorized users can come into contact with them. This is especially critical in crisis cases where unauthorized access may result to further damage. Access control lists (ACLs) allow for tight access permissions control. Improperly configured ACLs may open recovery systems to cyber-attacks even if other components of the DR plan are well thought out. Nurhanudin (2021) criticizes DR plans that are not in line with NIST SP 800-34 framework stating that plans of this kind tend not to include ACLs or do them wrong. C. Network Security as a Primary Support of Continuity. Availability and integrity of a system during a disaster are critically dependent on a secure and proof network. According to Corrales-Estrada et al., (2021), sustainability oriented firms often invest in sophisticated network security feature such as firewalls, intrusion detection system (IDS) and real-time monitoring. These features help DR and BC efforts by ensuring protection of systems from both internal and external threats. Widianti et al. (2024) emphasize the need for virtual protection in unstable risk environments. As the cyber threats change, the stability and reliability of the network infrastructure is more and more important. They promote Zero Trust Architecture, which presupposes that any connection may be compromised and therefore needs to be authenticated.
D. Identity Verification and Authentication
Gupta et al. (2023) examined healthcare institutions in Japan that revised their continuity plans after the 2011 Great East Japan Earthquake. These institutions adopted more rigorous user verification systems, which enhanced access security very substantially and minimized vulnerabilities. Their experience shows that identity management is not a security requirement, but it is a mandatory aspect of the continuity planning.
E. Organizational Integration and Process Resilience
Ostadi et al. (2023) introduce the concept of a process resilience model which merges DR, BC, IT governance and access control in a single model. Cross departmental collaboration and alignment of recovery strategies with general organizational goals is advocated for in this approach. This integration is, however, rarely present in the current practices, where departments work in silos.
F. Cultural Readiness and Training
Barnett-Quaicoo and Ahmadu (2021) emphasize the need for the organizational culture to be supportive of preparedness. Tools and policies are ineffective unless the employees understand and are committed to them. Proper training, simulations and assessment can make all the difference in developing this culture and continuity plans.