Premium Essay

Outage and Downtime

In: Computers and Technology

Submitted By apiatrou
Words 1509
Pages 7
Term Paper: Downtime and Outage

Aliaksandr Piatrou
Course SEC 6010: Planning for Information Security
Instructor: Mr. Dwight Robinson
December 10, 2015

Abstract
An outage or downtime at the online reservation system Sabre caused difficulties for many airlines, hotels and other hospitality industries all around the world. It affects business credibility, causes loss in revenue and legal procedures. Because of the recent delays Southwest, AirTran, American Airlines, US Airways, and United Airlines, who use Sabre global distribution system, topped the list of worst airlines in the US (Tooley, 2015).
Background
Sabre is one the leading provider of global distribution system to the travel and tourism industry. The Sabre GDS enables companies such as American Airlines, BCD Travel, Expedia, JetBlue, and Travelocity to search, price, book, and ticket travel services provided by airlines, hotels, car rental companies, rail providers and tour operators worldwide. It headquarters in Texas and employs over 10,000 employees in 60 countries with revenues of approximately $3 billion. Sabre service is using worldwide by 400 airlines in more than 700 airports, by more than 125,000 hotel properties, 27 car rental brands, 50 rail providers, 16 cruise lines and other global travel suppliers around the world generating more than $5.85 billion in revenue each year for its customers. More than 600 million people make purchases through that system annually (Sabre Authors, 2014). Sabre offers the industry’s broadest range of technology solutions including, data-driven business intelligence, mobile, distribution and Software-as-a-Service solutions, used by travel suppliers and buyers to plan, market, sell, serve and operate their business. It processes over 1.5 billion API data requests daily (100,000 messages per second), which puts them in a group of companies such as

Similar Documents

Premium Essay

Administrative Control Paper

...remain. 1. Overview This Business Impact Analysis (BIA) is developed as part of the contingency planning process for the {system name}{system acronym}. It was prepared on {insert BIA completion date}. 1.1 Purpose The purpose of the BIA is to identify and prioritize system components by correlating them to the business process(es) the system supports, and by using this information to characterize the impact on the process(es) if the system were unavailable. The BIA is composed of the following three steps: 1. Determine business processes and recovery criticality. Business processes supported by the system are identified and the impact of a system disruption to those processes is determined along with outage impacts and estimated downtime. The downtime should reflect the maximum that an organization can tolerate while still maintaining the mission. 2. Identify resource requirements. Realistic recovery efforts require a thorough evaluation of the resources required to resume business processes and related interdependencies as quickly as possible. Examples of resources that should be identified include facilities, personnel, equipment, software, data files, system components, and vital records. 3. Identify recovery priorities for system resources. Based upon the results from the previous activities, system resources can more clearly be linked to critical business processes and...

Words: 1287 - Pages: 6

Premium Essay

Unit 7 Case Study

...1) Determine what type of risk-based impacts X Axis would encounter in such a situation. 3.1.1 Identify Outage Impacts and Estimated Downtime This section identifies and characterizes the types of impact categories that a system disruption is likely to create in addition to those identified by the FIPS 199 impact level, as well as the estimated downtime that the organization can tolerate for a given process. Impact categories should be created and values assigned to these categories in order to measure the level or type of impact a disruption may cause. An example of cost as an impact category is provided. Organizations could consider other categories like harm to individuals and ability to perform mission. The template should be revised to reflect what is appropriate for the organization. Outage Impacts Impact categories and values should be created in order to characterize levels of severity to the organization that would result for that particular impact category if the mission/business process could not be performed. These impact categories and values are samples and should be revised to reflect what is appropriate for the organization. The following impact categories represent important areas for consideration in the event of a disruption or impact. Impact category: HIPAA Impact values for assessing category impact: • Severe = $1 Million • Moderate = $550,000 • Minimal = >$550,000 The table below summarizes the impact on each mission/business process...

Words: 625 - Pages: 3

Free Essay

Risk Management

...recurring theme is a company being unprepared for a major spike in internet traffic. Etsy designed and built their site to be responsive so content delivered is adjusted for the end-user based on whether it is accessed via mobile or Web. C. Impact If the site doesn’t test thoroughly in advance of peak times of demand it will inevitably struggle to meet demands of all channels." This type of shut down could have long term effects on brand image. Being and E-Commerce Company whose sole revenue is based on IT and networking services, downtime can be particularly costly, with the highest cost of a single event topping $1 million (more than $11,000 per minute). Downtime costs would also include lost business with customers (both short term and long term), employee time diverted from other tasks to get the IT systems running again, employee overtime expenses, the value of any lost data, emergency maintenance fees (particularly if the outage occurs during off hours) and additional repair costs that...

Words: 394 - Pages: 2

Premium Essay

Data Centers Flash Research

...system is causes us to experience frequent down time since it is has no safeguard to an unplanned interruption in service. However, the key features of a Tier III data center provides backup in case of power outages and allows for data access when certain paths aren’t accessible. This will reduce downtime by .31%. (Uptime Institute) These multiple independent distribution paths aim to continue system operation in the case of any disruption from unplanned circumstances. They also include multiple cooling distribution paths and are concurrently maintainable (datacenters.com), meaning that system problems could be fixed while the system is still online. Installing a tier III data center will strengthen our data management. After analyzing the figures, it is the clear that we will see a quick return on our investment in a Tier III data center. Installing the data center will take a year to complete and cost us $35 million dollars. Although this might seem like a large investment, we must keep in mind that we lose $14,800 dollars for every minute of downtime. With 10 outages to our ERP system in the last year alone, minimizing the amount of downtime is crucial. After installation of the data center is finished, our company will have saved over $48 million dollars in recovery of downtime over the next three years. Investing in redundant safeguards to our data center will be key to staying competitive amongst rival business. Works Cited "Disaster Recovery." -Data Centers.com. N.p...

Words: 334 - Pages: 2

Premium Essay

Bs It Capstone

...Technical Writing Project Cover Sheet Capstone Project Name: | Managed Service Provider Migration | Student Name: | xxxxxxx | Degree Program: | Bachelor of Science IT, Network Emphasis | Student Mentor Name: | xxxxxxxx | Table of Contents Capstone Introduction 1 Review of Other Work 3 Project Rationale 8 Systems Analysis and Methodology 10 Goals and Objectives 14 Project Deliverables 16 Project Plan and Timelines 21 Project Development 22 Accomplishments 26 Conclusion 26 References 28 Appendix: 29 Capstone Introduction With the rising costs of running a business and the goals to increase profits, organizations are constantly looking at ways to reduce operating expenses. In the technology realm of an organization, reduction of costs can be achieved by streamlining processes and automation. Another option that can be explored within organizations to reduce costs is the outsourcing of their technology departments to a manage service provider. Organizations are looking into options to utilize technology to reduce costs by migrating their technology to a 3rd party to managed their infrastructure. Concordia is mid-sized bank based out of California that has a wide area network consisting of 125 branch offices spread out through California and the surrounding states. Concordia has implemented a project to get out of the information technology area so that they can focus on their core principles of the banking industry. Concordia preferred to...

Words: 8397 - Pages: 34

Premium Essay

Management

...presented here was developed on March 18, 2012. It is developed as a part of Omega Research’s contingency Planning process. The report here will analyze different aspects related to Omega business processes. The report will analyze the business processes carried in the organization, requirements of data and resources and priority related to them. 1.1 Purpose BIS aims for identification and prioritization of components of system by correlating system’s business processes to these components. The information extracted will be then used for evaluating the impact that the system unavailability will have on processes. The BIA is comprised of three steps given below 1. Determine business processes and recovery criticality. The downtimes are required in every system. Also the business processes should include:- * Non-specific events on business processes identified during the work flow analysis. * The impact of legal and regulatory requirements. * The associated acceptable level of losses for the identified business processes 2. Identify resource requirements. Identification of resources is second important activity as resources play two important roles for a system. * The employees must be provided with all personnel facilities so that the employees can work smoothly. * In case of the equipments proper hardware or the good hardware and software should be provided for the productivity of the project. 3. Identify recovery priorities...

Words: 1531 - Pages: 7

Free Essay

Walmart Item Finder Application

...Domain Services, integrated DNS services, and easier authentication. Windows also offers ample support for their products to assist companies in better utilizing all of the advanced features. The owner of Fast Paced Financial has many reservations as to why he wants Windows Server 2008 utilized within his company, but he also does not understand why it is necessary to have such an ample amount of money dedicated to his IT department. A substantial amount of money is required to deploy a Windows Server 2008 network due to licensing and hardware costs. This is a concern to the Owner Mark Cohen since he does not work with IT for a living he does not understand all of the requirements that a company requires to run its network. Little to no downtime and preventing the loss of sensitive data are his primary concerns when it comes to his network functionality. “Some of the benefits of Active Directory DS include a hierarchical organizational structure, a single point of access to network resources, and the ability to create trust relationships with external networks running previous versions of Active Directory and even UNIX.” (Course, 2008) These are such great benefit since it is important that the data saved on the network is easily accessible and well organized. If the company organizes all of its data in a hierarchical structure by department then it will be easily retrieved by employees. Employees will know to look in a certain parent folder to find data on a topic rather...

Words: 1224 - Pages: 5

Free Essay

Information Security Today

...mistake happens sometimes intuitionally or accidentally. When an employee leaves classified data in unprotected manners can be treated as potential act of human error and attacker can take the privilege to breach the information security. According to Whitman, M., & Mattord, H., “This is because employee mistakes can easily lead to the following: revelation of classified data, entry of erroneous data, accidental deletion or modification of data, storage of data in unprotected areas, and failure to protect information.” Example: In April 1997, the core of the Internet suffered a disaster. Internet service providers lost connectivity with other ISPs due to an error in a routine Internet router table update process. The resulting outage effectively shut down a major portion of the Internet for at least twenty minutes. It has been estimated that about 45percent of Internet users were affected. (Whitman, M. E., & Mattord, H.J. 2012, p59). 2. Compromises to intellectual property Ans: According to Whitman, M., & Mattord, H., “Intellectual property is defined as the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit to the source. Intellectual property can be trade secrets, copyrights, trademarks, and patents.” An organisation always takes permission from other...

Words: 1130 - Pages: 5

Free Essay

Discussionpaper

...Chapter I Background of the Study In reach with this paper, it centres the power interruptions cause to distinctive business establishments worldwide. This article analytically investigates the times when back up electricity is most needed and becomes very important. It can keep the clocks running, so we aren’t late for work. We can have breakfast before we leave the house. It’s important to keep schedule and backup electricity can do just that. As long as the electricity is available, no one thinks much about it. Whether it’s during the day or at night, electricity keeps our lives in order. It affects your business, your schedule and even your entertainment. Electricity runs everything in our everyday lives. Gas stations can’t pump gas without it. Businesses have to close because their cash registers won’t work without it. Restaurants can’t cook food without it. Our lives almost come to a standstill without electricity. Everything in our world today depends on having the power to keep them running. In our house, everything we need and enjoy is plugged into a wall socket and requires electricity. Therefore, backup electricity has become a necessity and is no longer a luxury. It’s really inconvenient when the electricity is shut off at night and it’s too early to go to bed and sleep through it. You are usually in the middle of something when it happens and frustrating to wait for the power to be restored. This has all changed with the invention of the power inverter. No one has...

Words: 3252 - Pages: 14

Premium Essay

Business Continuity Implementation Planning

...Anne Tramposh CSS150-1304A-02 Introduction to Computer Security Professor Mark Ford 10/26/2013 Business Continuity Implementation Planning A Business Continuity Plan is “a plan for how to handle outages to IT systems, applications and data access in order to maintain business operation. A Business Impact Analysis is a prerequisite analysis for a Business continuity plan that prioritizes mission critical systems, applications and data and the impact of an outage or downtime.” (Kim. 2012. Pg.478) Every organization faces risk. Sometimes risk is measurable and predictable, and other times it is not. For example, a lawn care company knows that it has a seasonal business. There is some unpredictability in the seasons in that you do not know for sure if it is going to be a “wet” spring or a “dry” spring, or a hot summer or a cooler summer and so on. However, at least in the Midwest, a lawn care company can pretty well determine that we will have winter, spring, summer and fall. Additionally, it is predictable that the grass will need mowing from about mid to late March all the way through November. So, there is a small risk that it may start a little later and/or end a little sooner, but on the average it is fairly predictable. Other organizations have much greater risk inherent in their organizations. For example, a small stock brokerage firm may lose its entire business if stocks take the type of tumble that they did in 1998. (I personally know of some small firms that...

Words: 1104 - Pages: 5

Premium Essay

Antitrust and Consumer Protection Law

...information. The circuit court did consider this in their decision. Provide three recommendations to the CEO for a way to ensure that employees in the future cannot claim "technical issues" for why they didn't make a complaint. Explain, in your recommendations, the legal consequences to an employee if they do not utilize the complaint mechanism of the sexual harassment policy. Support these recommendations with current case law. To ensure that an employee cannot claim technical issues in the future: 1. The website statistics should be reviewed on a regular basis by the webmaster to verify if there have been periods of downtime on the site. Any downtime is automatically logged by the system and should be reported to the webmaster immediately following any unusual outages such as a power failure or server issues. The webmaster should document any outages in a spreadsheet in case an issue like this would occur. This should be part of the webmasters daily routine, to check and log these items. 2. There should be at least two means for employees to file a complaint. Most companies have a hotline and a webpage. In this day in age there will always be “technical difficulties”, so this should be addressed. 3. There should be regular meetings on...

Words: 575 - Pages: 3

Premium Essay

Hill Mcgraw

...McGraw-Hill Higher Education and Blackboard Strategic Plan Partnership Section 1 – Strategy TCO F – Given an organizational and industry context, identify and suggest a deployment strategy that will facilitate the success of a technologically-driven organization. The McGraw-Hill Companies deployment strategy is providing individuals vital knowledge to enable them to reach their full potential throughout their lives. Also McGraw-Hill Companies is driving the financial services, education and business information markets through leading brands such as Standard & Poor's, McGraw-Hill Education and J.D. Power and Associates. McGraw-Hill make straight with three enduring worldwide needs: • The Need for Capital • The Need for Knowledge • The Need for Transparency Knowledge: McGraw-Hill Education, a division of The McGraw-Hill Companies, is a leading trendsetter in the growth of teaching and learning solutions for the 21st century. Through a broad range of traditional and digital education content and tools, McGraw-Hill Education allow and prepares professionals and students of all ages to connect, learn and succeed in the global economy. Capital: McGraw-Hill Financial, a part of The McGraw-Hill Companies (NYSE:MHP), is a leading source of research and analytical tools for investment advisors, wealth managers and institutional investors. Transparency: J.D. Power and Associates is a global marketing information services company operating in key business sectors including...

Words: 2420 - Pages: 10

Free Essay

Database Recovery and Cloud Services

...TECHNOLOGY SUPPORT AVAILABILITY HIGH AVAILABILITY TECHNOLOGY INFORMATION TECHNOLOGY WHITE PAPER Disaster Recovery: Best Practices Downloads Disaster Recovery: Best Practices Contents 1 Executive Summary 2 Disaster Recovery Planning 2.1 Identification and Analysis of Disaster Risks/Threats 2.2 Classification of Risks Based on Relative Weights 2.2.1 External Risks 2.2.2 Facility Risks 2.2.3 Data Systems Risks 2.2.4 Departmental Risks 2.2.5 Desk-Level Risks 2.3 Building the Risk Assessment 2.4 Determining the Effects of Disasters 2.4.1 List of Disaster Affected Entities 2.4.2 Downtime Tolerance Limits 2.4.3 Cost of Downtime 2.4.4 Interdependencies 2.5 Evaluation of Disaster Recovery Mechanisms 2.6 Disaster Recovery Committee 3 Disaster Recovery Phases 3.1 Activation Phase 3.1.1 Notification Procedures 3.1.2 Damage Assessment 3.1.3 Activation Planning 3.2 Execution Phase 3.2.1 Sequence of Recovery Activities 3.2.2 Recovery Procedures 3.3 Reconstitution Phase 4 The Disaster Recovery Plan Document 4.1 Document Contents 4.2 Document Maintenance 5 Reference 1 Executive Summary Disasters are inevitable but mostly unpredictable, and they vary in type and magnitude. The best strategy is to have some kind of disaster recovery plan in place, to return to normal after the disaster has struck. For an enterprise, a disaster means...

Words: 5950 - Pages: 24

Free Essay

Active Directory

...is large, OUs can help simplify the task by grouping resources (such as users and computers) that have similar rights. - Replication makes it easier because any changes that are made are replicated to other domain controllers so that the network can run more efficiently. http://www.techrepublic.com/article/the-benefits-of-moving-clients-to-an-active-directory-environment/ Active Directory Domain Services (AD DS) benefits: Redundancy Fault Tolerance Serves as a domain controller that authenticates users when logging on to a network. Participates in storing, modifying, and maintaining the AD database (Textbook) Page 3 for major benefits of AD DS Mark is concerned about ensuring the network so that it has little to no downtime at all. AD DS can help ease this issue because of the system providing fault tolerance. It continues to provide services even if 1 or more servers experience hardware failure or loss of connectivity. How does it do this? It does this through its multimaster domain controller. Fault tolerance exists because of a shared database file called ntds.dit is shared with all domain controllers. One domain controller replicates to the other ones, so if it fails, the other can up where the other took off. <Textbook> The other concern Mark has is with the prevention of sensitive data loss. Microsoft Server 2008 uses BitLocker, which allows a...

Words: 625 - Pages: 3

Premium Essay

Test

...analysis to identify and prioritize process that must be recovered. * The potential impact of uncontrolled, non-specific events on business processes identified during the work flow analysis. * The impact of legal and regulatory requirements. * An estimate of the maximum allowable downtime (MAD) and the associated acceptable level of losses for the identified business processes. * An estimation of recovery time objectives (RTOs), recovery point objectives (RPOs) and recovery of the critical path (those business processes or systems that must receive the highest priority during recovery.) (Laughery, 2011) The main operation of Omega is selling services to customers. These services are to find the appropriate consultants and resources and to supply their customers with these resources as quickly as possible. If there are any disruptions in these operations or outages of equipment, Omega will lose money each day and pay large penalties. The operating processes run on a SAP system in an AIX environment. The processes include finding resources for customers, scheduling, invoicing, paycheck distribution, and managing the treasury and short-term funding. If any part of the SAP system has an outage, Omega basically has a two day window to restore the system without borrowing money which would lead to increase in costs and overhead. The only operations that have a workaround are payroll and the audit and compliance areas. As Reyes Emme mentioned an interview, “by self insuring payroll...

Words: 312 - Pages: 2