Presentation is loading. Please wait.

Presentation is loading. Please wait.

Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant.

Similar presentations


Presentation on theme: "Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant."— Presentation transcript:

1 Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant

2 Introduction Prevention, protection, and recovery are a crucial function to EVERY system or company. Prevention, protection, and recovery are a crucial function to EVERY system or company. It is most important to operations within the system It is most important to operations within the system –Not so much management Operations must have: Operations must have: –Disaster prevention and recovery plans –Plans for back up

3 Prevention/Protection Prevention – the act of keeping something from happening Prevention – the act of keeping something from happening There are 4 main methods: There are 4 main methods: 1.Redundancy 2.Hardware 3.Firewalls 4.Virus Protection

4 1.Redundancy Redundancy – a system design that makes duplicates to provide alternatives in case of failure Redundancy – a system design that makes duplicates to provide alternatives in case of failure Devices, referred to as Secondary Storage, are used to create system duplicates: Devices, referred to as Secondary Storage, are used to create system duplicates: Secondary storage – storing large amounts of data and instructions more permanently Secondary storage – storing large amounts of data and instructions more permanently

5 Redundancy RAID (Redundant Array of Independent/Inexpensive Disks) RAID (Redundant Array of Independent/Inexpensive Disks) Allows system to make a “reconstruction map” to rebuild data Allows system to make a “reconstruction map” to rebuild data –Multiple hard drives copy data so that if one drive fails, there is no single point of failure Improves efficiency Improves efficiency

6 Redundancy Software may be used to monitor or check the back-up system Software may be used to monitor or check the back-up system Improves quality of the system Improves quality of the system Valuable to keep copy of entire system at an external location Valuable to keep copy of entire system at an external location Disadvantage Disadvantage –If the back-up system isn’t monitored, the company will lose its redundancy Ex. Kerr administration building, 2 mos. ago Ex. Kerr administration building, 2 mos. ago

7 2. Hardware Consider the use of more expensive hardware Consider the use of more expensive hardware –Higher mean time between failure (MBTF) –Better quality hardware lasts longer Disadvantage Disadvantage –May not be financially possible

8 3. Firewalls Used to protect from external threats Used to protect from external threats –Break-ins or unauthorized access to the system Servers vs. Workstations Servers vs. Workstations –Anyone can access a website (server) –Can set protocol levels of firewalls –Ex. No access to COB from outside Other preventative measures include the use of identification numbers and passwords Other preventative measures include the use of identification numbers and passwords

9 4. Virus Protection *Viruses are the #1 type of attack on information systems Used to prevent contamination of system Used to prevent contamination of system –Internal personnel pulling external threats into system Constantly monitors and protects Constantly monitors and protects –Should be frequently updated Ex. Symantec updates online Ex. Symantec updates online

10 Recovery Recovery – regaining or saving something lost Recovery – regaining or saving something lost Naval helicopter crash Naval helicopter crashhelicopter

11 Recovery Make sure data are never compromised Make sure data are never compromised –Overlaps with redundancy Ex: COB writes tapes and takes them offsite every night Ex: COB writes tapes and takes them offsite every night Companies can be hired to do this job Companies can be hired to do this job

12 Testing Removes the redundancy element Removes the redundancy element Anything can happen Anything can happen Element of quality control (QC) Element of quality control (QC) Stage problems Stage problems

13 COBIT COBIT is an IT governance framework and supporting toolset COBIT is an IT governance framework and supporting toolset Allows managers to bridge the gap between control requirements, technical issues, and business risks Allows managers to bridge the gap between control requirements, technical issues, and business risks COBIT enables clear policy development and good practice for IT control throughout organizations COBIT enables clear policy development and good practice for IT control throughout organizations

14 COBIT 2 for disaster prevention and recovery 2 for disaster prevention and recovery DS 10- manage problems DS 10- manage problems DS 4 – ensure continuous service DS 4 – ensure continuous service RACI chart RACI chart –Responsible –Accountable –Consulted –Informed

15 COBIT DS-10 RACI Chart RACI Chart

16 COBIT DS-4 RACI Chart RACI Chart

17 Let’s Review… There are 4 main types of prevention There are 4 main types of prevention –Redundancy * –Hardware –Firewalls –Virus Protection If the back up system is not kept track of, the system loses its redundancy If the back up system is not kept track of, the system loses its redundancy

18 Let’s Review… Recovery is getting out of the problem once it’s too late Recovery is getting out of the problem once it’s too late Make sure data are never compromised Make sure data are never compromised COBIT is a tool that helps bridge the gap between requirements and risk COBIT is a tool that helps bridge the gap between requirements and risk


Download ppt "Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant."

Similar presentations


Ads by Google