Stephen S. Yau CSE465-591, Fall 2006 1 Contingency and Disaster Recovery Planning.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Review Questions Business 205
Systems Availability and Business Continuity Chapter Four Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
9 - 1 Computer-Based Information Systems Control.
Business Crisis and Continuity Management (BCCM) Class Session
Pertemuan 16 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Stephen S. Yau CSE , Fall Risk Management.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Stephen S. Yau CSE , Fall Security Strategies.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
Network security policy: best practices
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
November 2009 Network Disaster Recovery October 2014.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Discovery Planning steps (1)
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
ISA 562 Internet Security Theory & Practice
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Business Continuity & Disaster recovery
C ONNECTING FOR A R ESILIENT A MERICA Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP) Skip Breeden.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Disaster Recovery and Business Continuity Planning.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Continuity of Operations (COOP) Planning Guidelines for Dukes County.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Disaster Recovery 2015 Indiana Statewide Payroll Conference Michael Ievoli-Client Support Specialist IV, Major Accounts September 16, 2015 Copyright ©
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Business Continuity Disaster Planning
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Disaster Recovery. Refer to the process,policy and procedure related to recovery or continuation of technology infrastructure critical to an organization.
Introduction to Business continuity Planning 6/9/2016 Business Continuity Planning 1.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Information Security Crisis Management Daryl Goodwin.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Welcome to the ICT Department Unit 3_5 Security Policies.
Business Continuity Steven S. Keleman, CPM. Emergency Management Prevention Response Preparation Mitigation Recovery.
Information Systems Security
Business Continuity Plan Training
Processing Integrity and Availability Controls
Business Contingency Planning
Disaster Recovery at UNC
Continuity of Operations Planning
Developing and testing the Plan
MANUFACTURING DISASTER RECOVERY PLAN
Presentation transcript:

Stephen S. Yau CSE , Fall Contingency and Disaster Recovery Planning

Stephen S. Yau CSE , Fall Definitions Contingency planning: –Multifaceted approaches to ensure critical system and network assets remain functionally reliable Disaster recovery planning: –Describing exact steps and procedures the personnel in key departments must follow in order to recover critical information systems in case of a disaster that causes loss of access to systems.

Stephen S. Yau CSE , Fall Other Security Planning NSTISS-National Security Telecommunications and Information Systems Security –NSTISS policies: –NSTISS directives: –NSTISS training: ASU has already received certificates of courseware for NSTISSI 4011 and CNSSI 4012

Stephen S. Yau CSE , Fall Why Do We Need Planning? No 100% secure system. No matter how much effort we put in risk management and try to prevent bad things from happening, bad things will happen. What can we do? –Plan for the worst Not just how we will restore service Also plan on how we will continue to provide service in case of a disaster

Stephen S. Yau CSE , Fall When Do We Need Planning? Contingency plan/disaster recovery plan is ready to be invoked whenever a disruption to the system occurs –Need these plans long before a disaster occurs, usually in parallel with Risk Management. Plans should cover for occurrence of at least the following events: –Equipment failure –Power outage or telecommunication network shutdown –Application software corruption –Human error, sabotage or strike –Malicious software attacks –Hacking or other Internet attacks –Terrorist attacks –Natural disasters

Stephen S. Yau CSE , Fall Plan Components A contingency/disaster recovery plan should include the following information: –Measure disruptive events –Contingency plan: response procedures and continuity of operations –Backup requirements –Plan for recovery actions after a disruptive event –Procedures for off-site processing –Guidelines for determining critical and essential workload –Individual employees’ responsibilities in response to emergency situations –Emergency destructive procedures

Stephen S. Yau CSE , Fall Measure Disruptive Events Identify and evaluate possible disruptive events: –Identify most critical processes and requirements for continuing to operate in the event of an emergency –Identify resources required to support most critical processes –Define disasters, and analyze possible damage to most critical processes and their required resources –Define steps of escalation in declaring a disaster

Stephen S. Yau CSE , Fall Response Procedures and Continuity of Operations Reporting procedures –Internal: notify IA personnel, management and related departments –External: notify public agencies, media, suppliers and customers Determine immediate actions to be taken after a disaster happens –Protection of personnel –Containment of the incident –Assessment of the effect –Decisions on the optimum actions to be taken –Taking account of the power of public authorities

Stephen S. Yau CSE , Fall Backup Requirements Critical data and system files must have backups stored off-site. Backups are used to –Restore data when normal data storage is unavailable –Provide online access when the main system is down Not all data needs to be online or available at all times –Backup takes time and need additional storage space –Require extra effort to keep backup consistent with normal data storage –Backup should consider data-production rates and data-loss risk and be cost-effective

Stephen S. Yau CSE , Fall Backup Requirements (cont.) Decide what and how often to backup depending on risks: –Immediate losses of services: power failure or application crash that any data that has not been saved will be lost. If the data is critical, users must be aware of this risk and make periodic “saves” themselves –Media losses: storage media has physical damage and can no longer be read. Need to decide How often to do a complete backup? Will incremental backups be done between two complete backups? What media will be used for backup? –Archiving inactive data: recent active data should be put onto a hard disk for fast access, while old inactive data can be archived to tape, CD or DVD in order to free hard disk space

Stephen S. Yau CSE , Fall Plan for Recovery Actions High-level management must decide what the organization should do after a disruptive event happens. Possible choices: –Do nothing: loss is tolerable; rarely happens and cost more to correct it. –Seek for insurance compensation: provides financial support in the event of loss, but does not provide protection for the organization’s reputation. –Loss mitigation: isolate the damage and try to bring the system back online as soon as possible. –Bring off-site system online for continuous operation: maintain an off-site backup system that will kick in when the a disruptive event has made the original system unavailable. Identify all possible choices, including cost/benefit analysis and present recommendations to high-level management for approval.

Stephen S. Yau CSE , Fall Off-site Processing Choices for off-site processing: –Cold site: an empty facility located offsite with necessary infrastructure ready for installation of back-up system in the event of a disaster –Mutual backup: two organizations with similar system configuration agree to serve as a backup site for each other –Hot site: a site with hardware, software and network installed and compatible to production site –Remote journaling: online transmission of transaction data to backup system periodically to minimize loss of data and reduce recovery time –Mirrored site: a site equips with a system identical to the production system with mirroring facility. Data is mirrored to backup system immediately. Recovery is transparent to users

Stephen S. Yau CSE , Fall Off-site Processing (cont.) Mirrored Site Remote Journaling Hot Site Mutual Backup Cold Site Restore time Cost

Stephen S. Yau CSE , Fall Decision Factors for Off-site Processing Availability of facility Ability to maintain redundant equipment Ability to maintain redundant network capacity Relationships with vendors to provide immediate replacement or assistance Adequacy of funding Availability of skilled personnel

Stephen S. Yau CSE , Fall Guidelines for Determining Critical and Essential Workload Understand system’s mission goal Identify mission critical processes Identify dependencies among different departments/personnel within the organization Understand influence of external factors –Government agencies –Competitors –Regulators

Stephen S. Yau CSE , Fall Individual Responsibilities in Emergency Response Emergency response planning coordinator: coordinating the following activities: –Establish contingency/disaster recovery plans –Maintain/modify the plans –Audit the plans High-level manager (department manager, VP, etc.) –Understand process and mission goal of organization –Monitor contingency/disaster recovery plans and keep plans updated All other employees –Know contingency/disaster recovery plans –Understand own responsibilities and expectations during operation –Know whom to contact if something not covered in plan happens

Stephen S. Yau CSE , Fall Emergency Destructive Procedures Under certain situations, an emergency response may focus on destroying data rather than restoring data –Physical protection of system is no longer available –Critical assets (product design documents, list of sensitive customer or supplier, etc.) An emergency destructive plan should contain –Prioritized items that may need to be destroyed –Backup procedure about critical data at a secure off- site location –Specify who has authority to invoke destructive plan

Stephen S. Yau CSE , Fall Test a Contingency/Disaster Recovery Plan Testing is a necessary and essential step in planning process: –A plan may look great on paper, but until it is carried out, no one knows how it will perform –Testing not only shows the plan is viable, but also prepares personnel involved by practicing their responsibilities and removing possible uncertainty

Stephen S. Yau CSE , Fall Test a Contingency/Disaster Recovery Plan (cont.) Five methods of testing such a plan –Walk-through: members of key units meet to trace their steps through the plan, looking for omissions and inaccuracies –Simulation: during a practice session, critical personnel meet to perform “dry run” of the emergency, mimicking the response to true emergency as closely as possible

Stephen S. Yau CSE , Fall Test a Contingency/Disaster Recovery Plan (cont.) –Checklist: more passive type of testing, members of the key units “check off” the tasks on list for which they are responsible. Report accuracy of the list –Parallel testing: backup processing occurs in parallel with production services that never stop. If testing fails, normal production will not be affected. –Full interruption: production systems are stopped as if a disaster had occurred to see how backup services perform

Stephen S. Yau CSE , Fall References M. Merkow, J. Breithaupt, Information Security: Principles and Practices, Prentice Hall, August 2005, 448 pages, ISBN J. G. Boyce, D. W. Jennings, Information Assurance: Managing Organizational IT Security Risks. Butterworth Heineman, 2002, ISBN