Professional Documents
Culture Documents
Shubham Mallick
2185044
Step 1: Since BCM is crucial, it should have the top management's nod.
Therefore, the first step in any business continuity management lifecycle
is to get the top management's commitment.
Step 2: The next step in the business continuity management lifecycle is
to communicate this policy to all key stakeholders including vendors and
outsourced parties.
Step 3: Identify a BCM sponsor who has the authority to implement
business continuity management as per the policy. He can have a team
and formulate a framework which covers activities identified under the
BCM software's scope.
Step 4: The next step to follow in the business continuity management
lifecycle is to analyse the basic impact to identify critical functions under
the scope of BCM and carry out a risk assessment of those critical
functions.
Step 5: After implementing all the above plans, create an exercise
program to cover different plans in line with the plans' objectives, review
the plans, and ascertain their limitations or gaps.
Step 6: The next step in the business continuity management lifecycle is
to carry out the plan-do-check-act cycle. This includes managing the
program through periodic management review, internal audits and self-
assessments; embedding the BCM culture; carrying out exercises; and
carrying out preventive and corrective actions to show continual
improvement
ii) In LAN-based backup, all servers are connected to the LAN and all
storage devices are directly attached to the storage node. The data to be
backed up is transferred from the backup client (source), to the backup
device (destination) over the LAN, which may affect network
performance. Streaming across the LAN also affects network
performance of all systems connected to the same segment as the backup
server.
iii) The SAN-based backup is also known as the LAN-free backup. The
SAN-based backup topology is the most appropriate solution when a
backup device needs to be shared among the clients. In this case the
backup device and clients are attached to the SAN.