Incident and Disaster Response Chapter 10 Copyright Pearson Prentice Hall 2013.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Business Continuity Planning and IT Disaster Recovery.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Developing a Records & Information Retention & Disposition Program:
Intrusion Detection Systems and Practices
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Disaster Prevention and Recovery. Team Members   Gwenn Cooper   Kristy Short   John knieling   Carissa Vancleave   Matthew Owens.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lecture 11 Reliability and Security in IT infrastructure.
1 Figure 10-9: Business Continuity Planning Business Continuity Planning  A business continuity plan specifies how a company plans to restore core business.
Department Of Computer Engineering
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1 Incident Response Chapter 10 Copyright 2003 Prentice-Hall.
General Awareness Training
Chapter 9.  In previous chapters, we have looked at threats, planning, and response  In Chapter 9, we complete the discussion of the plan-protect-respond.
HIPAA PRIVACY AND SECURITY AWARENESS.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
FORESEC Academy FORESEC Academy Security Essentials (II)
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Data Protection Chapter 9 Copyright Pearson Prentice Hall 2013.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Chapter 9. Copyright Pearson Prentice-Hall 2010  In previous chapters, we have looked at threats, planning, and response  In Chapter 9, we complete.
Chapter 9. Copyright Pearson Prentice-Hall 2010  In previous chapters, we have looked at threats, planning, and response  In Chapter 9, we complete.
Information Systems Security Operational Control for Information Security.
Computer Forensics Principles and Practices
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Data Protection Chapter 9 Copyright Pearson Prentice Hall 2013.
Developing Plans and Procedures
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Disaster Recovery and Business Continuity Planning.
每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
Chap1: Is there a Security Problem in Computing?.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Security fundamentals Topic 13 Detecting and responding to incidents.
1 Figure 10-4: Intrusion Detection Systems (IDSs) Actions  Alarms  Interactive analysis Manual event inspection of raw log file Pattern retrieval 
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Role Of Network IDS in Network Perimeter Defense.
Data Protection Chapter 9 Copyright Pearson Prentice Hall 2013.
PH.D Zhanglinyi CHAPTER 18 Ethical conflict.
Data Protection Chapter 9 Copyright Pearson Prentice Hall 2013.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Data Compromises: A Tax Practitioners “Nightmare”
Data Protection Chapter 9 Copyright Pearson Prentice Hall 2013.
Incident Response Chapter 10
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
U.S. Department of Justice
Anatomy of a Common Cyber Attack
Presentation transcript:

Incident and Disaster Response Chapter 10 Copyright Pearson Prentice Hall 2013

 Explain the basics of disaster response.  Describe the incident response process for major incidents.  Describe legal considerations.  Explain the necessity of backup.  Describe the functions and types of intrusion detection systems (IDSs).  Explain the importance of education, certification, and awareness.  Describe business continuity planning.  List the advantages of data centers.  Know the IT disaster recovery process. 2 Copyright Pearson Prentice Hall 2013

3

 In previous chapters, we have looked at threats, planning, and protections  In Chapter 10, we complete the discussion of the plan-protect-respond cycle  Response planning is necessary because defenses can never stop all attacks. Companies must respond appropriately when attacks happen or natural disasters occur 4 Copyright Pearson Prentice Hall 2013

10.1 Introduction 10.2 Incident Response Process 10.3 Intrusion Detection Systems 10.4 Business Continuity Planning 10.5 IT Disaster Recovery 5 Copyright Pearson Prentice Hall 2013

 The Situation ◦ Hurricane Katrina devastated New Orleans in 2005  Followed shortly by Hurricane Rita ◦ The U.S. Federal Emergency Management Administration (FEMA) botched the relief effort 6 Copyright Pearson Prentice Hall 2013

 Walmart Is the Largest Retailer in the United States ◦ Supplied $20 million in cash ◦ Supplied 100,000 free meals ◦ 1,900 truckloads full of diapers, toothbrushes, other emergency supplies  45 trucks were rolling before the hurricane hit land ◦ Provided police and relief workers with flashlights, batteries, ammunition, protective gear, and meals 7 Copyright Pearson Prentice Hall 2013

8

 What Was Walmart’s Process?  Walmart Business Continuity Center ◦ A permanent department with a small core staff ◦ Activated two days before Katrina hit ◦ Soon, 50 managers and specialists were at work in the center 9 Copyright Pearson Prentice Hall 2013

 Walmart Business Continuity Center ◦ Before computer network went down, sent detailed orders to its distribution center in Mississippi ◦ Recovery merchandise for stores: bleach and mops, etc. ◦ 40 power generators to supply stores with backup power ◦ Sent loss-prevention employees to secure stores 10 Copyright Pearson Prentice Hall 2013

 Communication ◦ Network communication failed ◦ Relied on telephone to contact its stores and other key constituencies  Response ◦ Stores came back to business within days ◦ Engaged local law enforcement to preserve order in lines to get into stores 11 Copyright Pearson Prentice Hall 2013

 Preparation ◦ Full-time director of business continuity ◦ Detailed business continuity plans ◦ Clear lines of responsibility  Multitasking ◦ During all of this, were monitoring a hurricane off Japan 12 Copyright Pearson Prentice Hall 2013

 Incidents Happen ◦ Protections inevitably break down occasionally ◦ Successful attacks are called security incidents, breaches, or compromises  Incident Severity ◦ False alarms  Apparent compromises are not real compromises  Also called false positives  Handled by the on-duty staff  Waste time and may dull vigilance 13 Copyright Pearson Prentice Hall 2013

 Incident Severity ◦ Major incidents  Beyond the capabilities of the on-duty staff  Must convene a Computer Security Incident Response Team (CSIRT)  CSIRT needs participation beyond IT security 14 Copyright Pearson Prentice Hall 2013

 Organization of the CSIRT ◦ Should be led by a senior manager ◦ Should have members from affected line operations ◦ The IT security staff may manage the CSIRT’s operation on a day-to-day basis ◦ Might need to communicate with the media; only do so via public relations ◦ The corporate legal counsel must be involved to address legal issues ◦ Human resources is necessary, especially if there are to be sanctions against employees 15 Copyright Pearson Prentice Hall 2013

 Incident Severity ◦ Disasters  Fires, floods, hurricanes, major terrorist attacks  Must assure business continuity  Maintaining the day-to-day operations of the firm  Need a business continuity group headed by a senior manager  Core permanent staff will facilitate activities  IT disaster response is restoring IT services  May be a subset of business continuity  May be a stand-alone IT disaster 16 Copyright Pearson Prentice Hall 2013

 Speed and Accuracy Are of the Essence ◦ Speed of response can reduce damage  Attacker will have less time to do damage  The attacker cannot burrow as deeply into the system and become very difficult to detect  Speed is also necessary in recovery 17 Copyright Pearson Prentice Hall 2013

 Speed and Accuracy Are of the Essence ◦ Accuracy is equally important  Common mistake is to act on incorrect assumptions  If misdiagnose the problem or take the wrong approach, can make things much worse  Take your time quickly 18 Copyright Pearson Prentice Hall 2013

 Planning Before an Incident or Disaster ◦ Decide what to do ahead of time ◦ Have time to consider matters thoroughly and without the time pressure of a crisis ◦ (During an attack, human decision-making skills degrade) ◦ Incident response is reacting to incidents according to plan ◦ Within the plan, need to have flexibility to adapt ◦ Best to adapt within a plan than to improvise completely 19 Copyright Pearson Prentice Hall 2013

 Team Members Must Rehearse the Plan ◦ Rehearsals find mistakes in the plan ◦ Practice builds speed  Types of Rehearsals ◦ Walkthroughs (table-top exercises) ◦ Live tests (actually doing planned actions) can find subtle problems but are expensive 20 Copyright Pearson Prentice Hall 2013

10.1 Introduction 10.2 Incident Response Process 10.3 Intrusion Detection Systems 10.4 Business Continuity Planning 10.5 IT Disaster Recovery 21 Copyright Pearson Prentice Hall 2013

 Process for Major Incidents  Detection, Analysis, and Escalation ◦ Must detect through technology or people  Need good intrusion detection technology  All employees must know how to report incidents ◦ Must analyze the incident enough to guide subsequent actions  Confirm that the incident is real  Determine its scope: who is attacking; what are they doing; how sophisticated they are, etc. 22 Copyright Pearson Prentice Hall 2013

 Detection, Analysis, and Escalation ◦ If deemed severe enough, escalate to a major incident  Pass to the CSIRT, the disaster response team, or the business continuity team 23 Copyright Pearson Prentice Hall 2013

 Containment ◦ Disconnection of the system from the site network or the site network from the Internet (damaging)  Harmful, so must be done only with proper authorization  This is a business decision, not a technical decision 24 Copyright Pearson Prentice Hall 2013

 Containment ◦ Black-holing the attacker (only works for a short time) ◦ Continue to collect data (allows harm to continue) to understand the situation  Especially necessary if prosecution is desired 25 Copyright Pearson Prentice Hall 2013

 Recovery ◦ Repair during continuing server operation  Avoids lack of availability  No loss of data  Possibility of a rootkit not having been removed, etc. 26 Copyright Pearson Prentice Hall 2013

 Recovery ◦ Data  Restoration from backup tapes  Loses data since last trusted backup 27 Copyright Pearson Prentice Hall 2013

 Recovery ◦ Software  Total software reinstallation of operating system and applications may be necessary for the system to be trustable  Manual reinstallation of software  Need installation media and product activation keys  Must have good configuration documentation before the incident  Reinstallation from a disk image  Can greatly reduce time and effort  Requires a recent disk image 28 Copyright Pearson Prentice Hall 2013

 Apology ◦ Acknowledge responsibility and harm without evasion or weasel words ◦ Explain potential inconvenience and harm in detail ◦ Explain what actions will be taken to compensate victims, if any 29 Copyright Pearson Prentice Hall 2013

 Punishment ◦ Punishing employees usually is fairly easy  Most employees are at-will employees  Companies usually have wide discretion in firing at-will employees  This varies internationally  Union agreements may limit sanctions or at least require more detailed processes 30 Copyright Pearson Prentice Hall 2013

 Punishment ◦ The decision to pursue criminal prosecution  Must consider cost and effort  Must consider probable success if pursue (often attackers are minors or foreign nationals)  Loss of reputation because the incident becomes public 31 Copyright Pearson Prentice Hall 2013

 Punishment ◦ Collecting and managing evidence  Forensics: courts have strict rules for admitting evidence in court  Call the authorities and a forensics expert for help 32 Copyright Pearson Prentice Hall 2013

 Punishment ◦ Collecting and managing evidence  Protecting evidence  Pull the plug on a server if possible  This is a business decision, not an IT decision  Document the chain of custody  Who held the evidence at all times  What they did to protect it  Document the chain of custody 33 Copyright Pearson Prentice Hall 2013

 Postmortem Evaluation ◦ What should we do differently next time? 34 Copyright Pearson Prentice Hall 2013

35 DimensionCriminal LawCivil Law Deals withViolations of criminal statutes Interpretations of rights and duties that companies or individuals have relative to each other PenaltiesJail time and finesMonetary penalties and orders to parties to take or not take certain actions Cases brought byProsecutorsPlaintiff is one of the two parties Criterion for verdictBeyond a reasonable doubt Preponderance of the evidence (usually) Requires mens rea (guilty mind) UsuallyRarely, although may affect the imposed penalty Applicable to IT securityYes. To prosecute attackers and to avoid breaking the law Yes. To avoid or minimize civil trials and judgments Copyright Pearson Prentice Hall 2013

 Cyberlaw ◦ Cyberlaw is any law dealing with information technology  Jurisdictions ◦ Areas of responsibility within which government bodies can make and enforce law but beyond which they cannot 36 Copyright Pearson Prentice Hall 2013

 The United States Federal Judicial System ◦ U.S. District Courts  94 in the United States  Decisions in trials are only binding on the litigants 37 Copyright Pearson Prentice Hall 2013

 The United States Federal Judicial System ◦ U.S. Circuit Courts of Appeal  13 in the United States  Do not conduct trials  Review district court decisions  Decisions are precedents only for the district courts under the circuit court of appeals making a decision 38 Copyright Pearson Prentice Hall 2013

39 Copyright Pearson Prentice Hall 2013

 The United States Federal Judicial System ◦ U.S. Supreme Court  Final arbiter of U.S. federal law  Only hears about 100 cases per year  Usually only reviews cases that involve conflicts between appellate court precedents or important constitutional issues 40 Copyright Pearson Prentice Hall 2013

 U.S. State and Local Law ◦ In the United States, many powers are reserved for the states ◦ This typically includes the prosecution of crimes taking place within a state or that do not affect interstate commerce ◦ For most cybercrimes committed within a state, state law applies ◦ State cybercrime laws vary widely ◦ Local police usually investigate crimes under both local and state laws 41 Copyright Pearson Prentice Hall 2013

 International Law ◦ Differences are wide and rapidly changing (generally improving) ◦ Important to multinational firms ◦ Also important to purely domestic firms  Suppliers and buyers may be in other countries  Attackers may be in other countries ◦ Several treaties exist to harmonize laws and facilitate cross-border prosecution  Generally immature 42 Copyright Pearson Prentice Hall 2013

43 Copyright Pearson Prentice Hall 2013

 Admissibility of Evidence ◦ Unreliable evidence may be kept from juries ◦ Belief that juries cannot evaluate unreliable evidence properly ◦ Example: hearsay evidence  Federal Rules of Civil Procedure ◦ Guide U.S. courts ◦ Now have strong rules for evaluating the admissibility of electronic evidence 44 Copyright Pearson Prentice Hall 2013

 Computer Forensics Experts ◦ Professionals trained to collect and evaluate computer evidence in ways that are likely to be admissible in court ◦ Meet with them before there is a need because the initial moments of an intrusion require correct action 45 Copyright Pearson Prentice Hall 2013

46 Copyright Pearson Prentice Hall 2013

 Expert Witnesses ◦ Normally, witnesses can only testify regarding facts, not interpretations ◦ Expert witnesses may interpret facts to make them comprehensible to the jury in situations where juries are likely to have a difficult time evaluating the evidence themselves 47 Copyright Pearson Prentice Hall 2013

 18 U.S.C. § 1030 ◦ United States Code Title 18, Part I (Crimes) Section 1030 ◦ Actions prohibited  Hacking  Malware  Denial of service 48 Copyright Pearson Prentice Hall 2013

 18 U.S.C § 1030 ◦ Protected computers  Applicability is limited to protected computers  Include “government computers, financial institution computers, and any computer which is used in interstate or foreign commerce or communications” ◦ Often require damage threshold for prosecution  The FBI may require even higher damages to prosecute 49 Copyright Pearson Prentice Hall 2013

 18 U.S.C § 2511 ◦ Prohibits the interception of electronic messages, both en route and after the message is received and stored ◦ Allows service providers to read the content of mail  A company can read employee mail if it owns the mail system 50 Copyright Pearson Prentice Hall 2013

 Other Federal Laws ◦ Many traditional federal criminal laws may apply in individual cases ◦ For example, fraud, extortion, and the theft of trade secrets ◦ These laws often have far harsher consequences than cybercrime laws 51 Copyright Pearson Prentice Hall 2013

10.1 Introduction 10.2 Incident Response Process 10.3 Intrusion Detection Systems 10.4 Business Continuity Planning 10.5 IT Disaster Recovery 52 Copyright Pearson Prentice Hall 2013

 Event logging for suspicious events  Sometimes, send alarms  A detective control, not a preventative or restorative control 53 Copyright Pearson Prentice Hall 2013

54 Copyright Pearson Prentice Hall 2013

55 Copyright Pearson Prentice Hall 2013

 Network IDSs (NIDSs) ◦ Stand-alone device or built into a switch or router ◦ NIDSs see and can filter all packets passing through them ◦ Switch or router NIDSs can collect data on all ports ◦ A NIDS collects data for only its portion of the network  Blind spots in network where no NIDS data is collected ◦ Cannot filter encrypted packets 56 Copyright Pearson Prentice Hall 2013

 Host IDSs (HIDSs) ◦ Attractions  Provide highly detailed information for the specific host ◦ Weaknesses of Host IDSs  Limited Viewpoint; Only one host  Host IDSs can be attacked and disabled 57 Copyright Pearson Prentice Hall 2013

 Host IDSs (HIDSs) ◦ Operating System Monitors  Collects data on operating system events  Multiple failed logins  Creating new accounts  Adding new executables (programs—may be attack programs) 58 Copyright Pearson Prentice Hall 2013

 Host IDSs (HIDSs) ◦ Operating System Monitors  Modifying executables (installing Trojan horses does this)  Adding registry keys (changes how system works)  Changing or deleting system logs and audit files  Changing system audit policies  User accessing critical system files  User accessing unusual files  Changing the OS monitor itself 59 Copyright Pearson Prentice Hall 2013

 Log Files ◦ Flat files of time-stamped events ◦ Individual logs for single NIDs or HIDs ◦ Integrated logs  Aggregation of event logs from multiple IDS agents (Figure 10-18)  Difficult to create because of format incompatibilities  Time synchronization of IDS event logs is crucial (Network Time Protocol) 60 Copyright Pearson Prentice Hall 2013

 Event Correlation (Figure 10-21) ◦ Suspicious patterns in a series of events across multiple devices ◦ Difficult because the relevant events exist in much larger event streams that are logged ◦ Usually requires many analysis of the integrated log file data 61 Copyright Pearson Prentice Hall 2013

Sample Log File (many irrelevant log entries not shown) 62 Copyright Pearson Prentice Hall 2013

 Tuning for Precision ◦ Too many false positives  False alarms  Can overwhelm administrators, dull vigilance ◦ False negatives allow attacks to precede unseen 63 Copyright Pearson Prentice Hall 2013

 Tuning for Precision ◦ Tuning for false positives turns off unnecessary rules; reduces alarm levels of unlikely rules  For instance, alarms for attacks against Solaris operating systems can be deleted if a firm has no Sun Microsystems servers  Tuning requires a great deal of expensive labor  Even after tuning, most alerts will be false positives 64 Copyright Pearson Prentice Hall 2013

 Updates ◦ Program, attack signatures must be updated frequently  Processing Performance ◦ If processing speed cannot keep up with network traffic, some packets will not be examined ◦ This can make some IDSs useless during attacks that increase the traffic load 65 Copyright Pearson Prentice Hall 2013

 Storage ◦ There will be limited disk storage for log files ◦ When log files reach storage limits, they must be archived ◦ Event correlation is difficult across multiple backup tapes ◦ Adding more disk capacity reduces the problem but never eliminates it 66 Copyright Pearson Prentice Hall 2013

 Honeypot ◦ A fake server or entire network segment with multiple clients and servers ◦ Legitimate users should never try to reach resources on the honeypot ◦ Primarily used by researchers studying attacker behavior by recording everything a visitor does 67 Copyright Pearson Prentice Hall 2013

68 Copyright Pearson Prentice Hall 2013

10.1 Introduction 10.2 Incident Response Process 10.3 Intrusion Detection Systems 10.4 Business Continuity Planning 10.5 IT Disaster Recovery 69 Copyright Pearson Prentice Hall 2013

 Business Continuity Planning ◦ A business continuity plan specifies how a company plans to restore or maintain core business operations when disasters occur ◦ Disaster response is restoring IT services 70 Copyright Pearson Prentice Hall 2013

71 Copyright Pearson Prentice Hall 2013

 Principles of Business Continuity Management ◦ Protect people first  Evacuation plans and drills  Never allow staff members back into unsafe environments  Must have a systematic way to account for all employees and notify loved ones  Counseling afterwards 72 Copyright Pearson Prentice Hall 2013

 Principles of Business Continuity Management ◦ People have reduced capacity in decision making during a crisis  Planning and rehearsal are critical ◦ Avoid rigidity  Unexpected situations will arise  Communication will break down and information will be unreliable  Decision makers must have the flexibility to act 73 Copyright Pearson Prentice Hall 2013

 Principles of Business Continuity Management ◦ Communication  Try to compensate for inevitable breakdowns  Have a backup communication system  Communicate constantly to keep everybody “in the loop” 74 Copyright Pearson Prentice Hall 2013

 Business Process Analysis ◦ Identification of business processes and their interrelationships ◦ Prioritization of business processes  Downtime tolerance (in the extreme, mean time to belly-up)  Importance to the firm  Required by higher-importance processes ◦ Resource needs (must be shifted during crises)  Cannot restore all business processes immediately 75 Copyright Pearson Prentice Hall 2013

 Testing the Plan ◦ Difficult because of the scope of disasters ◦ Difficult because of the number of people involved 76 Copyright Pearson Prentice Hall 2013

 Updating the Plan ◦ Must be updated frequently ◦ Business conditions change and businesses reorganize constantly ◦ People who must execute the plan also change jobs constantly ◦ Telephone numbers and other contact information must be updated far more frequently than the plan as a whole ◦ Should have a small permanent staff 77 Copyright Pearson Prentice Hall 2013

10.1 Introduction 10.2 Incident Response Process 10.3 Intrusion Detection Systems 10.4 Business Continuity Planning 10.5 IT Disaster Recovery 78 Copyright Pearson Prentice Hall 2013

 IT Disaster Recovery ◦ IT disaster recovery looks specifically at the technical aspects of how a company can get its IT back into operation using backup facilities ◦ A subset of business continuity or for disasters the only affect IT ◦ All decisions are business decisions and should not be made by mere IT or IT security staffs 79 Copyright Pearson Prentice Hall 2013

 Types of Backup Facilities ◦ Hot sites  Ready to run (power, HVAC, computers): just add data  Considerations: rapid readiness at high cost  Must be careful to have the software at the hot site up-to-date in terms of configuration 80 Copyright Pearson Prentice Hall 2013

81 Copyright Pearson Prentice Hall 2013

 Types of Backup Facilities ◦ Cold sites  Building facilities, power, HVAC, communication to outside world only  No computer equipment  Less expensive but usually take too long to get operating 82 Copyright Pearson Prentice Hall 2013

 Types of Backup Facilities ◦ Site sharing  Site sharing among a firm’s sites (problem of equipment compatibility and data synchronization)  Continuous data protection needed to allow rapid recovery 83 Copyright Pearson Prentice Hall 2013

 Office Computers ◦ Hold much of a corporation’s data and analysis capability ◦ Will need new computers if old computers are destroyed or unavailable  Will need new software  Well-synchronized data backup is critical ◦ People will need a place to work 84 Copyright Pearson Prentice Hall 2013

 Restoration of Data and Programs ◦ Restoration from backup tapes: need backup tapes at the remote recovery site ◦ May be impossible during a disaster  Testing the IT Disaster Recovery Plan ◦ Difficult and expensive ◦ Necessary 85 Copyright Pearson Prentice Hall 2013

Or, as we say in Hawaii, “All pau” 86

Copyright © 2013 Pearson Education, Inc. Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall