IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

Transaction Journaling
Information Technology Disaster Recovery Awareness Program.
How to Ensure Your Business Survives, Even if Your Server Crashes Backup Fast, Recover Faster Fast and Reliable Disaster Recovery, Data Protection, System.
Business Plug-In B4 MIS Infrastructures.
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
CIOassist Technologies Your CIO on Demand… Business Continuity Planning Our Offering CIOassist Technologies (
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
BCP/DRP Consultancy Project- An approach
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Business Continuity Planning and Disaster Recovery Planning
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Brian E. Brzezicki. An organization is dependant on resources, personnel and tasks performed on a daily bases to be healthy and profitable. Loss or disruption.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Stephen S. Yau CSE , Fall Contingency and Disaster Recovery Planning.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Chapter 9 Business Continuity Planning and Disaster Recovery
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Principles of Incident Response and Disaster Recovery
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Vital Records Fuel Your Recovery….. Donna Read, CRM Florida Gulf Coast ARMA November 16, 2010 Are You Running on Empty????
ISA 562 Internet Security Theory & Practice
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
David N. Wozei Systems Administrator, IT Auditor.
Business Continuity & Disaster recovery
C ONNECTING FOR A R ESILIENT A MERICA Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP) Skip Breeden.
NOAA WEBShop A low-cost standby system for an OAR-wide budgeting application Eugene F. Burger (NOAA/PMEL/JISAO) NOAA WebShop July Philadelphia.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Business Continuity and Disaster Recovery Planning.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Creating a complete recovery solution Adam Backman Partner, White Star Software.
Disaster Recovery and Business Continuity Planning.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
HalFILE 2.1 Network Protection & Disaster Recovery.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Disaster Recovery. Refer to the process,policy and procedure related to recovery or continuation of technology infrastructure critical to an organization.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Information Security Crisis Management Daryl Goodwin.
Database recovery contd…
Planning for Application Recovery
CompTIA Security+ Study Guide (SY0-401)
AS ICT Module 2 Objectives: Security of Data
Business Continuity / Recovery
Agenda Backup Storage Choices Backup Rule
Audit Plan Michelangelo Collura, Folake Stella Alabede, Felice Walden, Matthew Zimmerman.
CompTIA Security+ Study Guide (SY0-501)
Business Contingency Planning
Business Continuity Technology
Disaster Recovery is everyone’s job!
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

IS 380

 Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies backup and post-disaster recovery procedures

 Reduce the risk of financial loss by improving the company’s ability to recover and restore operations.

 Project initiation  Conduct the business impact analysis (BIA)  Recovery strategies  Plan design and development  Implementation  Testing  Continual maintenance

 Companies are more vulnerable to penetration immediately after a disaster.

 A business continuity coordinator should be identified  Should have senior management approval  Every department should be involved  Should include a budget, milestones, deadlines, and identify tasks and success factors.  The people who develop the BCP should also be the ones who execute it.

 Sr. management may be legally required to have a BCP.  Maintain confidentiality of information  Maintain integrity of information, etc.

 Interviews employees and partners  Documents business functions  Identifies criticality of each function  Identifies possible threats to the business

 For each threat, the BIA should identify:  Maximum tolerable downtime  Operational disruption  Financial considerations  Regulatory responsibilities (What is the law?)  Reputation and branding

 Threats can be manmade, natural, or technical  The BIA should consider:  Equipment malfunction  Unavailable utilities  Unavailable facility  Unavailable vendor/service provider  Software/data corruption or loss

 Reputation  Contract violation  Loss in revenue or productivity  Legal violations  Increase in operational expense

 Nonessential  Normal  Important  Urgent  Critical

 Must be implemented to be effective  Must be cost effective  Should map to the threats and levels of criticality identified in the BIA

 Fortification of facility/site  Redundancy (servers, network)  Redundant vendor support  Insurance  Data backup  Fire detection/suppression  Spare equipment

 Hot site – Just add data  Warm site – Needs data and systems  Cold Site – You just get the building  Redundant site – A mirror site, fully owned  Consider costs, time to get operational  Must be tested  Tertiary Site – “backup to the backup”

 Reciprocal agreement – two companies back each other up  Cheap but a lot of issues  Offsite location – the further the better.  Rolling hot site – do something with all those unused shipping containers.  Multiple processing centers – failover in seconds

 Human resources (AKA getting people to work)  Voice and data systems  Data backups  Supplies (Where are the paper clips and pens?)  Documentation

 Nondisasters  Disasters  Catastrophe

 MTBF – mean time between failures.  MTTR – mean time to recover

 Hardware backups – restoring images?  COTS – commercial off the shelf  Software backups – store OS and software install media at both sites.  Keep data offsite too.  Software escrow – for one-off ‘custom’ software, a copy of source code is stored with a 3 rd party.

 Procedures  Responsibilities  Roles and Tasks  Initiation, Activation, Recovery, Reconstruction, Appendix

 Will people make it in ?  Executive succession planning  Two people can not be on the same bus at the same time.  Phone tree – where to report

 The archive bit  Full backup – clears archive bit  Differential backup – everything since full – archive bit left alone  Incremental – everything since last incremental; reset archive bit  Store onsite and offsite

 Image backup  Bare metal recovery (BMR)  Previous versions - Windows Vista/2008  Periodically test backups  Bad drive  Old tape  etc

 Disk shadowing – RAID1  Disk duplexing – additional controller card.  Electronic vaulting – copies of files periodically transmitted offsite.  Remote Journaling – xmit delta, usually databases in real time. Can avoid corruption issues  Electronic tape vaulting – essentially backing up to a large remote tape library.

 Continuous Data Protection  Point in time recovery - you can ‘go back in time’ to just before the problem.  Great for data corruption issues, delete or altered files.  Continuous VS near continuous.  A little like Apple’s ‘Time machine’, Windows ‘Previous versions’

 Synchronous replication  Asynchronous replication  DFS replication (Windows 2008) and rsync (Unix)

 Hacking, DOS, data theft, etc.

 Checklist test (manager review)  Structured walk through  Simulation test  Parallel test  Full interruption test

 The BCP should be integrated with change management  Personnel changes need to be taken into account  Drills should be done regularly to identify where holes have developed  Identify people responsible for maintanence

GroupTypeThreats Preventative measures Recovery strategies AEducational BFinancial CMilitary DHospitality