Full Project
Full Project
Kingdom
IT of Saudi Arabia
Department
وزارة التعليم
Ministry of Education
جامعة القصيم
Qassim University
College of Computer
كلية الحاسب
Information Technology Department قسم تقنية المعلومات
Students:
Raghad Aldahami 351200974
Hind Alharbi 361202830
Waad Almofadhi 351205683
Supervisor:
Dr. Ali Al Khalifah
Qassim-Saudi Arabia
1434/1435 (2013/2014)
Project Documentation Template
IT Department
Table of Contents
1 INTRODUCTION 1.1
4 INTRODUCTION 2.1
4 BACKGROUND 2.2
18 INTRODUCTION 3.1
Certificate
It is certified that project report has been prepared and written under my
direct supervision and guidance. The project report is approved for submission
for its evaluation.
Dedication
Acknowledgement
The success and final outcome of this project required a lot of guidance
and assistance from many people and we are extremely privileged to have got
this all along the completion of our project. All that we have done is only due to
such supervision and assistance by Dr.Ali AlKhalifah
Raghad, Hind and Waad.
Project Documentation Template
IT Department
Abstract
CHAPTER ONE
INTRODUCTION
1.1 Introduction
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
2.2 Background
Business processes
Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
12
2.2.6 History
Assessing risk
In this step, test and rehearse the plan before putting it into
operation to ensure its efficacy, conducted live simulation of the
disaster recovery process, and trained staff to deal with the
disaster recovery plan. [25]
Ongoing Management
In [26] the authors display the main six main causes of data
loss
• Natural disasters
organization.
• Network failure
• Network intrusion
• System failure
• Human errors
• Dependency
• Cost
• Security
Protect data and ensure that it is not lost due to disasters that may
be natural or man-made disasters, this is the primary goal of
disaster recovery.
• Replication Latency
• Reliability
• Failure Detection
• Data Storage
Carbonite Server 1\fully restore systems and 1\Expensive Carbonite works on Provide all the tools
Backup devices that are required for comprehensive data
2\very flexible and smooth protection virtual server environments and
physical server environments
Plan B Disaster 1\technical support from 1\No fixed pricing has its own technology plan to provide IT
Recovery specialized engineers. 2\No free trial and recovery solutions to customers.
2\high security. Which takes a snapshot of systems and
data and immediately transforms them
into a virtual environment so you can work
at the time of a disaster.
Zerto IT 1\Require technical Protects assets and data and reduces the
Resilience 1\multiple integrations knowledge cost of storage and facilitates recovery by
Platform 2\Automation of recovery providing synchronization and full
processes automation of the recovery process
• User needs a username, email and password for register and the
password will be hashing before saving in the database.
23
• After login the plan and reports pages will appear to the user.
• When the user clicks the plan page they will see the steps of
incident handling, how they can choose incident criticality
and a flowchart to show the processes of handling incident.
The user will choose from 1 to 4 incidents that may happen
with them to show the impact, process, mitigation and
resources for the incident. Then start filling the report then
show the report and there will be the option to download the
report as a PDF file or save it in the database or both.
• In reports page user can show all saved report order by reporting
date. and they can download it as a PDF file.
• When user faces a problem they can choose the category and
write an email and the problem then it will be saved in the
database where we can read it and contact them by their
email address if there needed, or they can click in the send
email button to send an email to us.
24
25
CHAPTER THREE
METHODOLOGY
3.1 Introduction
This chapter will review methodology approach used in this
project, The type of study, and selected research method. It briefs
different types of research methods in general and types of
studies. The type of study and methodology approach and type of
research methods for this project was determined.
Descriptive Research
Explanatory Research
26
Exploratory Research
• Quantitative Research
• Qualitative Research
CHAPTER FOUR
SYSTEM DESIGN AND IMPLEMENTATION
4.1 Introduction
This database is less flexible, and more structured of the way that
stores data. To make your database more effective, your data must
be structured. A good designed scheme will reduce the
redundancy and increase consistency. It is declarative, and
30
This type is used for databases when the requirements are not
defined clearly, or you have huge amount of unstructured data.
The main feature that NoSQL provide is ease of access.
Relational database has an oscillating relationship with
applications written in object-oriented programming languages.
NoSQL database solve this issue through APIs. [33]
4.3.1 Node.js
It is a software system that uses JavaScript on the server,
designed to create dynamic page content and files that have read,
write, open and close enabledand network applications are subject
to development and expansion such as web servers. [36][37] One
31
4.3.2 react.js
It is an open source library by Facebook based on JavaScript
• Use one-way data linking where the flow structure controls the
flow of data to components through a single control point.
Home Page
When the user enters the website, the homepage will appear.
And the home page includes the contact information and
support
33
In the login page, login and registration page will appear, where
the user will be able to create their own account. If the
“Remember me” was checked the user will able to logout any
time, if not it’ll automatically logout after 1 hour.
34
Plan page
Reports page
Here we present all the reports of the same user. Choose the
wanted report in the left to be seen.
40
Missing page
This page appears if the link of the page is wrong.
Logout
CHAPTER FIVE
TESTING
5.1 Introduction
1. Registration page
44
2. Login page
47
3. Home page
4. Plan page
Here we filled the incident report and we opened it as pdf
file to be able to download it and it’s saved in the
database as shown.
50
51
5. Report page
The report we filled earlier is saved here with other
reports and they are ordered by the latest date and it’s
saved in the database
52
5.6 Summary
CHAPTER SIX
CONCLUSION AND FUTURE WORK
6.1 Conclusion
6.3 Challenges
6.4 Contribution
APPENDIX
Project Installation:
56
REFERENCES
• [15] G. Crump, “Data backup and disaster recovery made simple,”
Oct 2019, [Online; accessed 26. Oct. 2019]. [Online]. Available:
https://searchdatabackup.techtarget.com/ tip/Data-backup-and-
disaster-recovery-made-simple
• [16] “Introduction to Backup and Disaster Recovery,” Aug 2019,
[Online; accessed 28. Oct. 2019]. [Online]. Available:
https://www.ibm.com/cloud/learn/backup-disaster-recovery
• [17] S. Climer. (2018) Mind sight:the di erence between disaster
recovery and back- ups: Why you need both. [Online].
58
. [34]
https://www.w3schools.com/nodejs/nodejs_intro
.asp
60
. [35] https://nodejs.org/en/about/
. [36]
https://www.w3schools.com/REACT/default.asp
. [37] جي_إس.نود/https://ar.wikipedia.org/wiki
. [38] https://hostpresto.com/blog/should-i-learn-
django-or-node-js/
. [39]
https://www.w3schools.com/REACT/default.asp
. [41] https://www.c-sharpcorner.com/article/what-
and-why-reactjs/