Ensuring Continuing Operations and Disaster Recovery By: Alyssa Gatrell Mike Harker Amy Shumway.

Slides:



Advertisements
Similar presentations
Chapter 7: Physical & Environmental Security
Advertisements

Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
9 - 1 Computer-Based Information Systems Control.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Factors to be taken into account when designing ICT Security Policies
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Procedures for Backup and Recovery Section 14. Key points and questions What data should be backed up and how often? What do we mean by full backup, incremental.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Protecting ICT Systems
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Essential Computer Concepts
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 6 of the Executive Guide manual Technology.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Course ILT Printer and virus management Unit objectives Perform various printing tasks, including installing printer drivers, printing documents, monitoring.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Module 11: Designing Security for Network Perimeters.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
HalFILE 2.1 Network Protection & Disaster Recovery.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
VIRUS.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
CONTROLLING INFORMATION SYSTEMS
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Security and Ethics Safeguards and Codes of Conduct.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
UNIT V Security Management of Information Technology.
Securing Information Systems
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Working at a Small-to-Medium Business or ISP – Chapter 8
UNIT 19 Data Security 2.
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

Ensuring Continuing Operations and Disaster Recovery By: Alyssa Gatrell Mike Harker Amy Shumway

What are the Threats? n Natural disasters n Power failures n Hardware failures n Theft of assets and data n Hacking n Virus infections n Departure of key personnel or disgruntled employees

What is Ensuring Continuing Operations? n Preventative measures to ensure that a system is not disrupted by potential threats. u Uninterruptible power sources u Storage measures u Measures to protect from departure of key personnel u Measures to protect from disgruntled former employees u Physical security measures u Virus protection u Firewalls u Encryption

What is a Virus? n A piece of self-replicating code

Kinds of Viruses n Boot Sector Viruses n Macro Viruses

Identifying the Threat n Floppy disk brought in n PC’s taken home or on business (laptops) n Increased use of n Increased use of the Internet

Minimizing the Virus Threat n Regular backups of data n Check all incoming software n Write-protect floppy disks whenever possible

Anti-Virus Tools n Floppies u “Sheep-dip” n PC’s u On-access scanners u On-demand scanners u Behavior blockers u Heuristic analysis

Functions of a Firewall n Controller n Filter n Monitor n Security guard n Screener

How Firewalls Work n Firewalls are like gatehouses in a medieval castle that provide perimeter defenses to determine who or what will be allowed to enter Castle Gatehouses Commons/Market Area Inner Mote and Wall Illustration taken from Disaster Recovery Journal Winter 1999 Outer wall

Types of Firewalls n Dual-Home Gateway n Screened-Host Gateway n Screened Subnet n Dual-Homed Routers

Dual-Home Gateway Internet Private Network Bastion Host

Screened-Host Gateway Internet Private Network Bastion Host Router

Screened Subnet Internet Private Network Router Sub-network

Dual-Homed Routers Internet Private Network Outside Router Inside Router

Other Thoughts on Firewalls n Internal firewalls are as important as external firewalls n Not the answer to total protection n Firewalls come in degrees of protection and complexity. n Companies should measure risk with costs of implementation and maintenance

Encryption n Alters information into an unintelligible format to prevent unauthorized access n Can only be decrypted with specified digital key n Prevents against data theft as it is passed from one person to another

What is Disaster Recovery? n Measures taken before a disaster that can lead to a successful reimplementation of systems u Backup regimen u Redundant hardware u Recovery facilities u Backup phone lines

Process for Determining Backup Needs n Step 1: Location identification n Step 2: Establish criticality of data n Step 3: Select backup medium u Factors F Quantity of data F Speed of backing up F Ease of recovery

Possible Mediums n Removable disks n Second hard drive / PC n Magnetic tape cartridges n Optical disks n Online services n Storage area network (SAN)

Implementation Procedures n Scheduling intervals and time of day n Verification n Media stocks and rotation u Two sets u Extra media n Source documentation n Storage u Away from destructive force u Off-site location

All Measures Should be Tested n Backup restoration n Firewall penetration testing n Intermittent checks of backup power