Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.

Slides:



Advertisements
Similar presentations
Business Plug-In B4 MIS Infrastructures.
Advertisements

Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
SQL Server Disaster Recovery Chris Shaw Sr. SQL Server DBA, Xtivia Inc.
VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Disaster Recovery in IT David Irakiza CSC 585-High Availability and Performance Computing 2012.
Mainframe Replication and Disaster Recovery Services.
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Keith Burns Microsoft UK Mission Critical Database.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Processing Integrity and Availability Controls
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Back Up and Recovery Sue Kayton February 2013.
1 Figure 10-9: Business Continuity Planning Business Continuity Planning  A business continuity plan specifies how a company plans to restore core business.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
November 2009 Network Disaster Recovery October 2014.
SQL Server 2008 Implementation and Maintenance Chapter 7: Performing Backups and Restores.
Business Continuity & Disaster Recovery Daniel Griggs Solutions Architect Ohio Valley September 30, 2008.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Contingency Planning, Disaster Recovery, and Risk Assessments
Chapter Sixteen Data Recovery and Fault Tolerance.
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
Windows Server Backup Chapter 18.
BACKUP & RESTORE The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
ISA 562 Internet Security Theory & Practice
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
Chapter 2: Non functional Attributes.  It infrastructure provides services to applications  Many of these services can be defined as functions such.
David N. Wozei Systems Administrator, IT Auditor.
Business Continuity & Disaster recovery
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Storage 101: Bringing Up SAN Garry Moreau Senior Staff Alliance Consultant Ciena Communications (763)
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Your business runs even when your server doesn’t DR Recommendation November 2011.
Module 13 Implementing Business Continuity. Module Overview Protecting and Recovering Content Working with Backup and Restore for Disaster Recovery Implementing.
Disaster Recovery and Business Continuity Planning.
Backup & Restore The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Disaster Recovery and Business Continuity Planning IBK3IBV01 College 7 Paul J. Cornelisse.
Principles of Computer Security, Fourth Edition Copyright © 2016 by McGraw-Hill Education. All rights reserved. Disaster Recovery and Business Continuity,
Component 8/Unit 9aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9a Creating Fault Tolerant.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
Establishing a Service Level Agreement SLA =tg= Thomas Grohser SQL Server MVP SQL Server Performance Engineering.
Information Security Crisis Management Daryl Goodwin.
1 High-availability and disaster recovery  Dependability concepts:  fault-tolerance, high-availability  High-availability classification  Types of.
Database recovery contd…
CompTIA Security+ Study Guide (SY0-401)
Adam Backman Chief Cat Wrangler – White Star Software
Server Upgrade HA/DR Integration
Managing Multi-User Databases
Processing Integrity and Availability Controls
Disaster Recovery Services
SpiraTest/Plan/Team Deployment Considerations
Disaster Recovery is everyone’s job!
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945

Recovery Strategies Figure 8-4 on page 916

Recovery Strategies Maximum Tolerable Downtime (MTD) Recovery Time Objective (RTO) – Acceptable downtime to avoid unacceptable consequences Work Recovery Time (WRT) – Restoring data, testing, making everything live Recovery Point Object (RPO) – Acceptable data loss

Recovery Strategies MTD, RTO, WRT, RPO help determine recovery solutions The are derived during BIA “Let’s say a company has determined if it cannot process order requests for 12 hours, the financial hit will be too large for it to survive.”

Recovery Strategies Figure 8-4 on page 916 Recovery Strategy Stages – Table 8-2 on page 917 List on page 918

Recovery Nondisaster – Hard disk failure Disaster – Facility is unusable for a day or longer. – Usually requires restoration from offsite copies Catastrophe – Destruction of facility

Recovery Mean time between failures (MTBF) Mean time to repair (MTTR)

Facility Recovery Hot site – fully configured and ready to run, expensive Warm site – Leased or rented, partially configured with infrastructure, but not computers Cold site – Leased or rented empty data center

Reciprocal agreement Company A and Company B agree to use each other ‘s facilities Most environment maxed out Stress level of two companies sharing facilities Mutual aid agreement – agree to help each other in an emergency

Redundant Sites Site configure exactly like primary site Most expensive backup option If a company could lose a million dollars if it were out of business for a few hours, the loss would override the cost of this option.

Facility Recovery Rolling hot site – back of large truck or trailer Multiple processing centers – Throughout the world? – Move all processing in a matter of seconds.

Challenges Many organizations do not totally understand how their networks are configured Will images work on new computers? Customized software from vendor when not given source code. – What if vendor goes bankrupt – Software escrow

Documentation Recovery procedures need to be documented – How to install images, configure OS and servers, install software – Who should be contacted

Human Resources If offsite facility is 250 miles away, how do we get people there and housed. Identify user requirements to carry out their job. Today we are extremely dependent on technology Executive Succession Plan – Loss of senior executive does not create leadership vacuum

Backups Full backup – all data is backed up Differential backup – All files that have modified since last full backup Incremental backup – all files that have been modified since last full or incremental backup

Backups Critical data should be backed up and stored both at an onsite area and an offsite area. Make sure back ups can be properly restored.

Backup Solutions Data shadowing – duplicating hardware and maintaining more than one copy of the information. Maybe more than one disk for the image. Data mirroring – Mirrored disk Multiple reads in parallel

Backup Solutions Electronic vaulting – If files are modified, periodically transmit them to an offsite backup. Once a hour, day, week, or month. Remote journaling – move transaction logs to offsite facility

Backup Solutions Asynchronous replication – Secondary data volumes are synched in seconds, hours or days. Synchronous replication – primary and secondary repositories are always in synch. Figure 8-7 on page 942

High Availability Hosting company’s SLA to get items fixed if it does go down. Example: Promise specific turnaround time for service interruption.

High Availability Fault tolerance – RAID disks Parity data to rebuild disks Failover capability – Switch over to a working system Cluster of servers – Load balancing – Failover capability

Insurance Cyber insurance – Losses due to denial-of-service, malware, hackers, etc. Business interruption insurance – If the company is out of business for a certain length of time, the insurance company will pay for specified expenses and lost earnings.