<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>Tutorial activities</title>
    <link>https://moodle.uwtsd.ac.uk/mod/forum/view.php?f=27139</link>
    <description>Tutorial activities</description>
    <generator>Moodle</generator>
    <language>en</language>
    <copyright>(c) 2026 UWTSD Moodle</copyright>
    <image>
      <url>https://moodle.uwtsd.ac.uk/theme/image.php/learnr/core/1773996748/i/rsssitelogo</url>
      <title>moodle</title>
      <link>https://moodle.uwtsd.ac.uk</link>
      <width>140</width>
      <height>35</height>
    </image>
    <item>
      <title>Week 7 activity</title>
      <link>https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=135436&amp;parent=222947</link>
      <pubDate>Tue, 24 Mar 2026 16:02:12 GMT</pubDate>
      <description>by Ayman El Hajjar. &amp;nbsp;&lt;p&gt;&lt;p&gt;Week 7 activity&lt;/p&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=135436&amp;parent=222947</guid>
    </item>
    <item>
      <title>Re: Week 6 activity</title>
      <link>https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222431</link>
      <pubDate>Tue, 17 Mar 2026 17:08:41 GMT</pubDate>
      <description>by Hetvi Nikulbhai Patel. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;Data Security, Governance and Compliance – Week 6&lt;br /&gt;EduFlex School – Learning Management System&lt;br /&gt;&lt;br /&gt;2529465-HETVI PATEL, 2507162-HIRAL JASOLIYA,2532368-SWASTI SAKARIYA,2523935-DIYA PATEL&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Scenario Analysis&lt;br /&gt;EduFlex school uses its Learning Management System for delivering lessons, managing assessments, tracking attendance, and communicating with students and parents. Potential threats include power outages, flooding, ransomware attacks, accidental data deletion, failed software updates, and cloud provider outages. The critical functions that must continue are student access to course materials, assignment submission and marking, progress tracking, secure login, and staff-to-parent communication.&lt;br /&gt;&lt;br /&gt;Business Continuity Plan&lt;br /&gt;Team Roles&lt;br /&gt;The BC team consists of an IT Lead who coordinates the response and updates leadership, an LMS Administrator who manages the platform, a Network Engineer who handles connectivity and servers, a Teaching Lead who arranges alternative lessons, a Communications Lead who updates staff, students and parents, and a Support Lead who logs user issues throughout the incident.&lt;br /&gt;&lt;br /&gt;Strategies&lt;br /&gt;EduFlex will maintain a warm site in a secondary cloud region as the primary fallback, allowing the LMS to be restored within a few hours. A cold site provides a secondary option when more recovery time is available. A mutual agreement with a partner school offers additional support during prolonged incidents. A separate secure repository of teaching materials ensures teachers can still share resources when the LMS is fully unavailable.&lt;br /&gt;&lt;br /&gt;BC Policy&lt;br /&gt;The purpose of this plan is to keep essential educational services running during any LMS disruption. It covers the LMS application, database, identity services, network, and backup environment. All BC team members receive induction training upon joining and annual refresher training. The plan is reviewed yearly and updated after any system change or incident.&lt;br /&gt;&lt;br /&gt;Maintenance and Testing&lt;br /&gt;A full simulation exercise is conducted annually to test the team's response. After every test or real incident, the team debriefs and updates the plan based on lessons learned.&lt;br /&gt;&lt;br /&gt;Disaster Recovery Plan&lt;br /&gt;Disaster Classifications&lt;br /&gt;Disasters are classified as either natural, such as flooding or power failure, or man-made, such as cyberattacks or accidental data loss. They are further classified as rapid onset, meaning sudden and without warning, or slow onset, meaning they develop gradually and may go unnoticed for some time.&lt;br /&gt;&lt;br /&gt;Recovery Priorities and Steps&lt;br /&gt;Systems are restored in a fixed order. Identity and network access come first, followed by the LMS database, then the LMS application, and finally any additional tools. Recovery steps include isolating affected systems, selecting a clean verified backup, restoring to the recovery environment, testing core functions such as logging in and submitting work, and monitoring the system before opening it to users.&lt;br /&gt;DR Team Roles&lt;br /&gt;The Recovery Lead coordinates the technical work and reports to leadership. System and Database Specialists carry out the restoration. The Security Specialist investigates the cause of the incident and confirms the environment is safe before the system goes live.&lt;br /&gt;&lt;br /&gt;DR Policy&lt;br /&gt;The policy covers the LMS, database, identity services, and network infrastructure. It identifies which staff require training in recovery procedures and requires that those procedures are tested regularly through desk checks, tabletop exercises, and structured walkthroughs involving both technical and teaching staff.&lt;br /&gt;&lt;br /&gt;Testing and Improvement&lt;br /&gt;After each exercise or real incident, findings are reviewed and the plan is updated to address any gaps. Regular testing ensures the team can respond quickly and confidently when a real disruption occurs.&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222431</guid>
    </item>
    <item>
      <title>Re: Week 6 activity</title>
      <link>https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222430</link>
      <pubDate>Tue, 17 Mar 2026 17:08:31 GMT</pubDate>
      <description>by Harsh Bipinbhai Valand. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;objective: Design a Disaster recovery plan and a Business Continuity plan&lt;br /&gt;
&lt;br /&gt;
week 6&lt;br /&gt;
harsh valand:2437861&lt;br /&gt;
sadab kureshi:2530072&lt;br /&gt;
tassavar kureshi:2530068&lt;br /&gt;
vinay patel:2519364&lt;br /&gt;
muhammad akteruzzman:2216724&lt;br /&gt;
&lt;br /&gt;
A mid-sized organisation relies on IT systems, cloud services, and office operations to deliver services. Disruptions could halt operations, cause financial loss, and damage reputation.&lt;br /&gt;
&lt;br /&gt;
1. Analyse the Scenario&lt;br /&gt;
&lt;br /&gt;
 Potential Disasters / Events&lt;br /&gt;
&lt;br /&gt;
 Natural:&lt;br /&gt;
 Flooding&lt;br /&gt;
 Fire&lt;br /&gt;
 Severe weather (storms, power outages)&lt;br /&gt;
&lt;br /&gt;
Man-made:&lt;br /&gt;
&lt;br /&gt;
 Cyberattacks (ransomware, phishing)&lt;br /&gt;
 Data breaches&lt;br /&gt;
 Hardware/software failure&lt;br /&gt;
 Human error&lt;br /&gt;
 Supply chain disruption&lt;br /&gt;
&lt;br /&gt;
2. Business Continuity Plan (BCP)&lt;br /&gt;
&lt;br /&gt;
 1. Form the BC Team&lt;br /&gt;
&lt;br /&gt;
  Roles &amp;amp; Responsibilities:&lt;br /&gt;
  BC Manager: Oversees entire continuity plan&lt;br /&gt;
  IT Lead: Handles systems and data continuity&lt;br /&gt;
  Operations Lead: Maintains business processes&lt;br /&gt;
  HR Lead: Staff communication and welfare&lt;br /&gt;
  Communications Officer: External/internal updates&lt;br /&gt;
&lt;br /&gt;
Assigned Responsibilities:&lt;br /&gt;
&lt;br /&gt;
  Plan development: BC Manager + IT Lead&lt;br /&gt;
  Testing: All department leads&lt;br /&gt;
  Maintenance: BC Manager&lt;br /&gt;
&lt;br /&gt;
2 Business Continuity Strategies&lt;br /&gt;
Exclusive-Use Options&lt;br /&gt;
&lt;br /&gt;
 Hot site: Fully operational backup site with real-time data (for critical systems)&lt;br /&gt;
 Warm site: Partial infrastructure with periodic backups&lt;br /&gt;
 Cold site: Basic facility with no active systems&lt;br /&gt;
&lt;br /&gt;
Shared-Use Options&lt;br /&gt;
 Cloud service providers&lt;br /&gt;
 Third-party recovery vendors&lt;br /&gt;
 Mutual aid agreements with partner organisations&lt;br /&gt;
&lt;br /&gt;
Specialised Options&lt;br /&gt;
 Mobile recovery units (temporary offices)&lt;br /&gt;
 Remote work (work-from-home infrastructure)&lt;br /&gt;
&lt;br /&gt;
 3 Business Continuity Policy&lt;br /&gt;
&lt;br /&gt;
 Purpose: Ensure uninterrupted delivery of critical services during disruptions&lt;br /&gt;
 Scope: Covers all departments, IT systems, and personnel&lt;br /&gt;
 Resources: Backup sites, cloud systems, trained personnel&lt;br /&gt;
 Roles: Clearly assigned BC team responsibilities&lt;br /&gt;
 Training: Regular staff awareness and simulation exercises&lt;br /&gt;
&lt;br /&gt;
 4 Maintenance&lt;br /&gt;
&lt;br /&gt;
 Quarterly testing (simulations and drills)&lt;br /&gt;
 Annual full review of the plan&lt;br /&gt;
 Continuous updates after incidents or changes&lt;br /&gt;
 Staff training and awareness programs&lt;br /&gt;
&lt;br /&gt;
 3. Disaster Recovery Plan (DRP)&lt;br /&gt;
  &lt;br /&gt;
 1 Disaster Classification&lt;br /&gt;
&lt;br /&gt;
 Natural vs Man-made&lt;br /&gt;
 Rapid onset: Fire, cyberattack, power outage&lt;br /&gt;
 Slow onset: System degradation, supply chain failure&lt;br /&gt;
&lt;br /&gt;
 2 Recovery Steps&lt;br /&gt;
&lt;br /&gt;
Step 1: Incident Response&lt;br /&gt;
 Detect and report incident&lt;br /&gt;
 Activate DR team&lt;br /&gt;
&lt;br /&gt;
Step 2: Assessment&lt;br /&gt;
&lt;br /&gt;
Evaluate damage and impact&lt;br /&gt;
&lt;br /&gt;
 Identify affected systems&lt;br /&gt;
&lt;br /&gt;
Step 3: Prioritisation&lt;br /&gt;
&lt;br /&gt;
Restore critical systems first:&lt;br /&gt;
 Network &amp;amp; servers&lt;br /&gt;
 Customer database&lt;br /&gt;
 Communication systems&lt;br /&gt;
&lt;br /&gt;
Step 4: Recovery Execution&lt;br /&gt;
&lt;br /&gt;
 Restore data from backups&lt;br /&gt;
 Switch to backup site (hot/warm)&lt;br /&gt;
 Validate system functionality&lt;br /&gt;
&lt;br /&gt;
Step 5: Communication&lt;br /&gt;
&lt;br /&gt;
 Inform employees, customers, stakeholders&lt;br /&gt;
 &lt;br /&gt;
 3 DR Policy&lt;br /&gt;
&lt;br /&gt;
 Scope: Covers IT systems, data, and infrastructure recovery&lt;br /&gt;
 Training: Regular technical recovery drills&lt;br /&gt;
 Testing: Backup restoration and failover testing&lt;br /&gt;
 Compliance: Align with data protection laws (e.g., GDPR)&lt;br /&gt;
&lt;br /&gt;
4. Testing and Improvement&lt;br /&gt;
&lt;br /&gt;
Methods:&lt;br /&gt;
&lt;br /&gt;
 Simulation exercises: Realistic disaster scenarios&lt;br /&gt;
 Desk checks: Review procedures step-by-step&lt;br /&gt;
 Structured walkthroughs: Team-based reviews&lt;br /&gt;
 Full-scale drills: End-to-end recovery testing&lt;br /&gt;
&lt;br /&gt;
Continuous Improvement:&lt;br /&gt;
 Record lessons learned&lt;br /&gt;
 Update plans regularly&lt;br /&gt;
 Improve response time and coordination&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222430</guid>
    </item>
  </channel>
</rss>