1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

True Business-Class Remote Online Backup 44% Of All Computer Users Have Reported At Least One Permanent Data Loss Your Business Data IS Your Business –
Information Technology Disaster Recovery Awareness Program.
1 Pertemuan 25 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 10 Membuat dan mengelola resiko dan kriminalitas sistem informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
Everything your business needs to know but probably doesn’t.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Princeton PC Users Group Hard Drive Disaster! By Paul Kurivchack March 14, 2005.
1 Pertemuan 26 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 21 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 01 Pengantar tentang database Matakuliah: >/ > Tahun: > Versi: >
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
1 Pertemuan > > Matakuliah: >/ > Tahun: > Versi: >
1 Pertemuan 19 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Minggu 1, Pertemuan 1 Introduction to Database Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
1 Pertemuan 19 Audit Reporting Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 12 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 8 The Object Definition Language (Lanjutan) Matakuliah: M0174/OBJECT ORIENTED DATABASE Tahun: 2005 Versi: 1/0.
Saving Your Business from a Data Loss Randy Clark.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Back Up and Recovery Sue Kayton February 2013.
Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.
Managing a computerised PO Operating environment 1.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Security and backups GCSE ICT.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Chapter 2: Non functional Attributes.  It infrastructure provides services to applications  Many of these services can be defined as functions such.
David N. Wozei Systems Administrator, IT Auditor.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
12015/10/20 Muhammad Salman University of Indonesia.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
1 Pertemuan 10 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 26 Making It Happen Matakuliah: A0194/Pengendalian Rekayasa Ulang Informasi Tahun: 2005 Versi: 1/5.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
1 Pertemuan 22 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Pertemuan 15 Business and Information Process Rules, Risks, and Controls Matakuliah: M0034 /Informasi dan Proses Bisnis Tahun: 2005 Versi: 01/05.
Install, configure and test ICT Networks
Verification & Validation
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 Pertemuan 9 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Chapter 6 Protecting Your Files
Pertemuan 16 Security Policies
Back Up and Recovery Sue Kayton October 2015.
Backup and restoration of data, redundancy
Guarding against loss of data
Presentation transcript:

1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1

2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa dapat menunjukkan hubungan antara Contingency planning dan crisis management

3 Outline Materi Data Recovery –How Does Data Loss Happen? –Do Nothing –Calling in The Experts –Protecting Yourself

4 Data Recovery If people are a company’s most valuable asset, then data comes a close second. As companies become more dependent on technology for all aspects of their operations, the information contained on computer disks and back-up tapes can mean the difference between continued success and failure. While most companies believe that their data is safe, many may not have set up event he most basic of back-up systems to protect it and data loss can happen to anyone.

5 How Does Data Loss Happen? Although data is a valuable commodity, not enough emphasis is placed on protecting this vulnerable asset from loss. While computer hardware and software are fallible, humans are notoriously even more so. Unfortunately many companies and individuals do not have – or do not put into practice – adequate back-up procedures, leaving themselves open to data loss. The majority of problems are caused by human error, such as accidentally overwriting back-up tapes, deleting important files, inadvertently formatting a hard disk or mishandling a laptop.

6 Malicious data loss can also be an issue, particularly where companies fail to make appropriate use of passwords. While there needs to be a balance between the complexity and frequency of password change and the ease with which users can remember them, to have passwords – even at the basic user level – that are common knowledge makes a company unnecessarily vulnerable. It is not unusual to find a list of everyone’s password stored in an easily accessible place within an office, or even a board displaying ‘this week’s password’.

7 Even if your staff are competent and trustworthy, hardware and software can still fail unexpectedly. Operating systems or packages may contain bugs or become corrupt, causing them to malfunction,with consequences such as overwritten data. Power surges from the power supply, or lightning, can also cause damage to computer equipment, and it is possible for the motor or the control board of a hard disk to burn out, locking its data inside, or for the disk just to fail when disaster strikes on a larger scale, there is always the more dramatic risk of the fire and water damage too.

8 Do Nothing Unfortunately, many companies are not prepared for the reality of hard disk or tape failure and often make a bad situation much worse. Retrievable data is often lost through inappropriate attempts to recover it. Simply rebooting a computer can cause the data to be overwritten permanently, as the system creates temporary files in supposedly unused space. A physically damage disk can become significantly more damage, sometimes to the point of no data being recoverable.

9 Calling in The Experts Whilst commercial data recovery tools exist, their use is not advisable as it is highly unlikely that a software tool written months ago, perhaps a continent away, can accurately diagnose the difference between a corrupted file system and a damaged head. These tools always provide a ‘best guess’ at what the problem is, and then give you the option to ‘go ahead and write to the media’, which is not a particularly safe thing to do.

10 Sometimes it is necessary to write customised programs for individual recoveries. When data has been lost because of software corruption rather than physical damage, extracting and rebuilding the files is the major process in recovery.

11 Protecting Yourself ‘Don’t panic’ is the first piece of advice to remember in a data loss emergency, and ‘do nothing’ – except call the experts – is the second. However, there are a number of simple steps you can take to protect your company against disaster. Put in place a regular, reliable back-up regime and make sure that it is strictly implemented by trained personnel. Duplicate the back-up to a second type of media so that if one fails the other is available.

12 Monitor the back-up to ensure that it has taken place and watch out for signs of anything unusual in the way the system operates. Keep at least one set of back-up tapes off site so that, if you premises burn down or are flooded, you will not lose your data. Back up before installing any new software. If possible, leave your systems on all the time in consistent environmental conditions – hardware failure happens most often at start-up and shut- down. Keep up with technology.

13 The End