Contingency Management Indiana University of Pennsylvania John P. Draganosky.

Slides:



Advertisements
Similar presentations
Information Technology Disaster Recovery Awareness Program.
Advertisements

HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Revision from last week  Assumptions are potential failure points in a project. They need to be monitored and managed. At the start of the project they.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Planning for Contingencies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Planning for Continuity
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Awareness Norfolk State University Policies.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
FORESEC Academy FORESEC Academy Security Essentials (II)
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Developing Plans and Procedures
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Incident Security & Confidentiality Integrity Availability.
Information Security Office Protecting Privacy in the New Millennium © Copyright Melissa Guenther, LLC. All rights reserved. Kelley Bogart – Information.
Working with HIT Systems
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Introduction to Information Security
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Incident Security & Confidentiality Integrity Availability.
SecSDLC Chapter 2.
IT-Secrurity Cookbook Enter your login: Enter your password:
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Security and Ethics Safeguards and Codes of Conduct.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Information Security Crisis Management Daryl Goodwin.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Welcome to the ICT Department Unit 3_5 Security Policies.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Systems Security
Review of IT General Controls
Securing Network Servers
East Carolina University
Business Continuity Plan Training
Chapter 17 Risks, Security and Disaster Recovery
Chapter 3: IRS and FTC Data Security Rules
Presentation transcript:

Contingency Management Indiana University of Pennsylvania John P. Draganosky

What is Contingency Planning? Major Components IUP Contingency Plan IUP Information & Safeguard Security Program Brief Overview

Contingency Planning The process by which the information technology and information security communities of interest position their organizations to prepare for, detect, react to, and recover from events that threaten the security of information resources and assets, both human and natural.

Major Components Incident Response Plan (IRP) Disaster Recovery Plan (DRP) Business Continuity Plan (BCP)

Major Components Incident Response Plan (IRP) Focuses on the immediate response to an incident. Any unexpected event is treated as an incident, unless and until a response team deems it to be a disaster.

Major Components Disaster Response Plan (DRP) Focuses on restoring operations at the primary site. If operations at the primary site cannot be quickly restored, then the BCP occurs concurrently enabling the business to continue at the alternate site until normal operations are restored.

Major Components Business Continuity Plan (BCP) Ensures that critical business functions can continue if a disaster occurs. BCP is activated & executed concurrently with the DRP when the disaster is major or long term & requires fuller & complex restoration of information & IT resources.

IUP Contingency Plan The Incident – IRP Some sort of facility compromise Fire and/or Water Terrorism or Bomb Threat Building Evacuation for an indefinite or unknown amount of time. Reaction Activate DRP Switch all production operations & user services to the Alternate Site.

IUP Contingency Plan The Incident – IRP User Problems (Administration, Faculty, Staff, and the Students) Virus or Worm Attack Hardware Failure User installed software problem that causes network problems (i.e., P2P & File Sharing) Reaction Help Desk services are notified by the User TSC Network Operations management suspends all network activity to that PC & notifies that user’s Help Desk.

IUP Contingency Plan The Disaster Response – DRP Once operations are running at the Alternate site, the damage assessment team takes over to get the primary site cleaned up with Recovery Operations In the case of User Problems, if the PC has been compromised, every effort will be made to save the data before rebuilding begins Data is placed on a remote secured server & is put back on the PC after the rebuild is complete

IUP Contingency Plan The Business Continuity – BCP Primary & Alternate Hot site user services are always online together When the Primary site fails, the Alternate site picks up immediately due to server replication that runs constantly The only down time there is in switching sites is getting the alternate site staffed Once the Primary site is operational, replication from the alternate site will keep information current

IUP Information & Safeguard Security Plan Information Protection Policy & Safeguard Plan Serves as the public portion of IUP’s compliance with the Gramm-Leach-Bliley Act (GLBA) defining what IUP will do & who is responsible for doing it

IUP Information & Safeguard Security Plan IUP Policy Statement “It is the policy if Indiana University of Pennsylvania that all information be used in a manner that maintains an appropriate & relevant level of confidentiality & that provides sufficient assurance of its integrity in compliance with existing laws & PASSHE & University Policies.”

IUP Information & Safeguard Security Plan Existing Laws & Policies Copyright Law US Title Code 18 Family Educational Rights & Privacy Act (FERPA) Pennsylvania Library Theft Law Gramm-Leach-Bliley Act (GLBA) Health Insurance Portability & Accountability Act (HIPPA) Electronic Communications Privacy Act Federal Privacy Act

IUP Information & Safeguard Security Plan University related information systems “Individual users with critical information maintained locally, i.e., on a PC, on paper, or in other media, shall also take appropriate steps to ensure that valuable & confidential information not be lost, damaged, or otherwise compromised.”

IUP Information & Safeguard Security Plan University related information systems “…confidential files should be locked when not in use. Sensitive or confidential info should be destroyed when discarded. It is particularly important that passwords to PC accounts with access to restricted information not be shared.”

IUP Information & Safeguard Security Plan Information Protection Procedures All IUP PC systems are subject to the IUP Information Assurance Guidelines. Designated system administrators are responsible for full compliance with the guidelines including the provisions for the physical & logical (authentication, secured hosts, virus scanning, active monitoring, backup/recovery) security management of each computer system.

IUP Information & Safeguard Security Plan Information Protection Procedures Physical Access Controls “Organization of work areas to minimize security risks of physical exposure to personally identifiable information, including storage in locked file cabinets, rooms, or vaults.” Requirements to enter a valid UserID and Password to access PCs (log off of PCs when not in use, use password-protected screen savers).

IUP Information & Safeguard Security Plan Information Protection Procedures Physical Access Controls Organize personal information & papers Use the Clean Desk method IUP Password Requirements are to change logon/AD password every 180 days. IUP does not require passwords to be changed

Contingency Planning Major Components IRP – DRP - BCP IUP Contingency Plan IUP Information & Safeguard Security Program Information Protection Policy Information Protection Procedures Review

Questions?