500 words hat strategies would you suggest to protect Ken 7 Windows data throughout the entire organization
Part of the implementation plan for the Ken 7 Windows Limited new enterprise resource planning (ERP) software application is a complete review of the Ken 7 Windows Limited business continuity plan (BCP), and disaster recovery plan (DRP), including their backup and restore plans. You are a disaster recovery analyst and have been given the responsibility to develop backup strategies that will minimize the impact to Ken 7 operations and provide protection from losing more than four hours of data resulting from any disruption.
After reviewing the Ken 7 Windows Limited current environment and the proposed new ERP software environment, you have identified the following separate types of computer backup needs:
- Desktop workstations: These workstations are stationary and always connected to the Ken 7 network. Ken 7 Windows Limited uses workstations for both administrative and operations purposes. While most important data is stored on shared file servers, some files are stored locally on each workstation.
- Laptop computers: Laptops are routinely used by sales people and other employees and contractors who work at various locations. These mobile workstations often use some downloaded data to operate in local mode and periodically upload modified data to a Ken 7 server. It is important to protect local Ken 7 laptop data when these workstations are not connected to the Ken 7 network.
- Data centric server computers: Several server computers store large amounts of shared data and must be protected with frequent backups. These server computers include database servers, authentication servers, and application servers.
- Nondata centric server computers: Ken 7 Windows Limited also uses server computers, such as Web servers, that are important to the Ken 7 Windows Limited environment but do not contain data that changes frequently. These servers should be backed up but not as frequently as data centric servers.
After reviewing the requirements, what strategies would you suggest to protect Ken 7 Windows data throughout the entire organization for each of the above?