Write a brief business project plan on remote backup system
Document Identifier: Remote Data Backup System
Date: (WRITE DATE)
Work Package: Planning and Project Management
Partners: GAK Group
Document Status: Approved
|Version||Summary of Changes||Document Status||Date Published|
TABLE OF CONTENTS
RELEASE PLAN.. 1
TABLE OF CONTENTS. 2
Project Brief. 3
BUSINESS CASE. 3
Project Objectives. 3
Project Team.. 4
SWOT Analysis. 4
Role of project team.. 5
Payment for project. 5
Method of Approach. 5
Product Description. 6
Project Description. 6
Project Scope. 7
Proposed Solution. 8
Customer Requirements. 11
This is a project of a storage company that provides data backup systems for businesses that intends to have its data backed up in a secure remote location. The data in the remote storage will be managed by the IT professionals of the business to ensure security, effective data processing and retrieval so that recovery of the organization’s data is guaranteed incase of permanent loss of onsite backups. According to Dunn (2007) remote backup services are provided by online backup providers though systems which are built around software which collects, encrypts, compresses and finally transfers business data on a given schedule into an offsite storage.
The project provides remote backup of the client’s data through encryption of the data by the Business’s IT staff before the data it sent to the remote data backup service provider. The business will be able to retrieve data from the remote backup system in case of damage to the onsite backup systems. According to Dugal (2003); Brandenburg (2004), the business case of a data backup system project should explain how the mandate of the project and the plan are viable in relation to the possible risks in the implementation of the plan.
- To meet the requests of clients in backing up their data through the signed contracts and apply the necessary protocols to safeguard the security of the data
- To ensure security of the client’s data through security protocols and backup systems
- To provide the clients with a complete report that evaluates the success of the backup process and demonstrate the data that has been backed up.
- To reduce the cost of backing up business data through the use of the remote backup service provider’s storage services
The stakeholders in this project include the GAK Company management, the local businesses who are the company’s clients, the project team, data users and the remote backup system provider.
The project team comprises of the members of the GAK Group who came together to share their strengths is starting the GAK company which provides backup services for the local businesses.
The team is comprised of members with skills and experience in the backup system. In addition, the business has already installed modern storage equipment within its premises that will supplement the remote backup system. The financial limitations make the major weakness of the company which prevents it from adequately expanding its storage systems. The business opportunities within the businesses of the locality which need to back up their data is an opportunity that the members of the team realized before deciding to start the business. The stiff competition from back up providers in the region is one of the challenges the company faces in addition to the security threats on the clients’ data that would lead to damage and loss of the privacy of the information within the remote backup system.
Role of project team
The project team will act as the owners of the GAK Company who would be the managers of the backup systems. The team will also ensure security of the client’s data within the remote storage. Communication with the clients and the remote backup provider will also be facilitated by the project team to ensure efficiency of service.
The clients will benefit most from the backup system because their data will be secured in a remote location from where they are able to access it at any time. The project team as the owners of the business will also benefit from the income of the backup services which comprises of the profit to the business.
Payment for project
The capital for the initiation of the backup system will come from the GAK group who are the shareholders of the company. The clients through their payment for the backup services will also pay for the project during it maturation phase.
Method of Approach
The approach of the project plan is to securely store the client’s data with a remote backup service provider. Eckert (2006) says that the approach used in storing data with a remote backup system should define the solution to existing and potential data security problem that the organization faces. In accordance to Wittmann (2011), the systems selected for data backup should be described in terms of development, whether they are based on the existing product, the specific technologies to be used and whether third parties are involved.
The approach of this project is based on contracting an online service provider to store the client’s data within offsite storage. The product is based on the current onsite back up systems in which backup data is stored on hard drives and CDROMs.
The desired outcomes of the project are the provision of reports to show the backed up data to the client business organizations and assurance of the security of the data. The reports are to be sent to head IT department or the CEO of the client organization. The security of the remote storage systems is to be maintained at all time. In addition, firewalls and password systems are to be put in place to prevent intruders from accessing the remote systems.
The systems are to be put online so that the clients can access their data at any time of the day or night. The products that are to be delivered by the remote backup system include business files with procedures and policies for the use of the data. Secure data will be provided to the clients through encryption software so that hackers would not communicate with the clients with an aim of obtaining privileged information.
The project will create remote backup data of all critical business files of the clients including those already within the onsite storage drives of the business. The storage services will be provided by the remote backup service provider. Sheffield (2003) explains that in remote data backups, the organization collects the data to be stored remotely, compresses it using the lossless compression algorithm, and encrypts it by at least 256 bits before it is transferred across the internet. The remote backup service provider will store the data in an encrypted state within the online servers.
Kelly (2002) asserts that the retrieval of data form a remote back up system by the clients can be achieved through a web browser. Access to the backup data will be possible through the service provider’s server. Kovar (2003) says that the positive impact of remote backup system is reduction of the cost of data loss incase of failure of the onsite backup systems. Therefore the implementation of this project will provide a wider option for secure storage the client business files.
GAK Company is likely to face legal suit from the client organizations due to anxiety related to the possible leaking of private information to third parties or business competitors. In addition, financial constraints due to over expenditure that would result failure of power outlets, emergency repairs to the company hardware and the purchase of new hardware, software and other backup equipment. There is also a possibility of loss of data from the offsite backup systems due to power surges or hardware failures hence leading to dire business consequences.
According to MacVittie (2005), the constraints involved in a remote back up system project would be limited by adequate budgetary allocation of the backup services. In addition, the security issue will be solved through security systems such a cryptography and firewalls that will protect client data from security breaches. Moreover, good financial plan is to be provided to cater for emergence expenditure such as maintenance and system repair costs.
The products for the backup services will include hardware such as servers, hard drives, network hardware and software such as data management systems. As Hardman (2004) points out, there is beta software that is offered by online backup service providers including elaborate security features. The place of work will be within the company premises through which the client businesses will access the remote backup services.
The project is justified by its viability through the budget and the capital from the shareholders. The use of security systems to deliver the objectives of providing secure remote storage also justifies the project. The project will thus deliver the backup services for its clients whenever they require them at an affordable price. The efficiency of the services will also be delivered by the use of modern technology and backup systems that will facilitate the access of the backed up data. The deliverables of the project will me measured through the speed of delivery and reliability of service. The cost of the project and the benefits in terms of profit are shown on the budget.
The location where the client’s data will be remotely backed is accessible through the link http://www.livedrive.com/forbusiness which is the offsite location. The contents that will be found within this location include the following:
- A description and picture of the power outlets
- Description and picture of the networking cables
- Servers both primary and secondary including a pictorial description
- Main terminal
Gilmer (2003) explains that the interfaces used in the remote storage of data should be designed in an infrastructure that allows effective data management and security.
The budget will provide the financial expenditure by the business in its investment on the remote back up systems. The budget will also include the amount of purchase of the backup software, hardware and the associated equipment. The source of revenue by the business and its outgoings is part of the budget. The GAK budget is as presented on the table below.
|Start and End date||Income (£)||Expenses (£)||Purchases (£)||Profit|
|1st Jan 2009- 31st Dec 2009||5000.00||1500.00||2000.00||1500.00|
|31st Jan 2010-31st Dec 2010||6500.00||2000.00||1500.00||3000.00|
|1st Jan 2011- Present||5500.00||1000.00||1800.00||2700.00|
It will be assumed that the selection of the remote backup service provider will enable trusted services through a provider who may not run out of business. Dunn (2007) adds that in remote database systems, it is assumed that the data encryption level provided by the database administrator is sufficient to ensure that the data is secure from unauthorized access. Furthermore, the management of the remote database is assumed to be effective so that user encryption passwords are protected from loss.
Eckert (2006) emphasizes that the stakeholders within the remote backup system must communicate effectively to ensure success of the system from the initial plan through the implementation process. The database administrators within the IT department also communicate to the management on their assessment of the service providers so that trusted services are selected to provide the remote backup system. According to Brandenburg (2004), it is through continuous communication between the database administrator and the users that access to the remote data backup system is possible.
The company customers will require the security of their data to be maintained in addition to assurance of unlimited access to the backed up. Moreover, reports on the type of data backed up, the level of security and the infrastructure protocols used to secure it will be required by the customers. According to Bass (2005), security is the most important issue in the remote backup system. Dugal (2003) adds that data users expect that a backup system will store correct files so that during retrieval the results of system queries will display relevant data.
- The GAK Company agrees within the contract with the local businesses not to disclose information to competitors under whichever circumstances
- The promises to train its staff on security protocols to enable it detect and manage any security threats
- The backed up data will be maintained every hour by the company’s IT personnel.
- The company guarantees that the data will undergo all processes including encryption before transfer to guarantee its security.
- The GAK will keep close relationship with the clients through frequent communication to ensure efficiency and effectiveness of backup services
Brandenburg, M. (2004), “Iomega Revs Up Backups”, Network Computing, vol. 15, no. 12, pp.
Bass, S. (2005), For Safe Backups, Think Outside the Box, PC World Communications, Inc,
United States, San Francisco.
Dunn, S. (2007), No-Brainer Backups Using Windows’ Own Tools, PC World Communications,
Inc, United States, San Francisco.
Dugal, D. (2003), “The importance of performing remote data backups”, Franchising World, vol.
35, no. 8, pp. 53-53-54
Eckert, B. (2006), “Protect computerized data with off-site backups”, Long-Term Living, vol. 55,
no. 5, pp. 42-42, 44.
Gilmer, B. (2003), “Computer backup systems”, Broadcast Engineering, vol. 45, no. 3, pp. 44-
Hardman, D. (2004), “Adaptive Backup as a Security Enhancer”, Computer Technology Review,
vol. 24, no. 6, pp. 23-23.
Kelly, B.J. (2002), “Data backup, security vital in aftermath of attacks, Y2K precautions still
useful”, Boulder County Business Report, vol. 21, no. 19, pp. C2-C2.
Kovar, J.F. (2003), “Compushare holds the key to securing bank’s backup data”, CRN, no. 1058,
MacVittie, D. (2005), “Big-Time Backups Made Simple”, Network Computing, vol. 16, no. 10,
Sheffield, M. (2003), “2 Computer Techs counting on potential lost data for business”, Memphis
Business Journal, vol. 25, no. 11, pp. 12-12
Wittmann, A. (2011), “Backups: IT’s Red-Headed Stepchild”, InformationWeek, no. 1289, pp.