DRP Disaster Recovery Planning. Social Networking... It's the way the 21st century communicates today.

Slides:



Advertisements
Similar presentations
WV High Quality Standards for Schools
Advertisements

Information Technology Disaster Recovery Awareness Program.
So You Want to Break Into the Industry… SAS No. 94 Requirements and Issues Related to IT Audits for Not-for-Profit Organizations.
CIP Cyber Security – Security Management Controls
Planning for the Future Disaster Recovery Plan / Business Continuity Plan Jim Zukowski, Ed.D. Texas State Board of Dental Examiners 2006 Annual ConferenceAlexandria,
National Incident Management System (NIMS)  Part of Homeland Security Presidential Directive-5, February 28,  Campuses must be NIMS compliant in.
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
International Federation of Accountants International Education Standards for Professional Accountants Mark Allison, Executive Director Institute of Chartered.
Kpmg Business Continuity Planning An experience based approach Tamás Gaidosch Director, Information Risk Management KPMG Central and Eastern Europe +36.
Business Continuity Disaster Recovery Risk Management How do these fit into a Framework?
@TxSchoolSafety Continuity of Operations Planning Workshop Devolution & Reconstitution.
Business Continuity Planning and Disaster Recovery Planning
Business Crisis and Continuity Management (BCCM) Class Session
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Disaster Recovery and Business Continuity Gretchen Grey.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Control environment and control activities. Day II Session III and IV.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
Security audits. Today’s talk  Security audits  Penetration testing as a component of Security auditing  Different types of information systems security.
Unit Introduction and Overview
6Th International Conference ICAO Global Aviation Training Office
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
ISA 562 Internet Security Theory & Practice
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
David N. Wozei Systems Administrator, IT Auditor.
Business Continuity & Disaster recovery
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Standards and Guidelines for IS Auditing (ISACA).
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Chapter 7 Enterprise Infrastructure, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise Copyright © 2010 by the.
Microsoft ® System Center Data Protection Manager 2007 with Service Pack 1 Infrastructure Planning and Design Published: January 2009 Updated: July 2010.
I MPLEMENTING IT S ECURITY FOR S MALL AND M EDIUM E NTERPRISES Short Presentation by Subhash Uppalapati. - Edgar R. Weippl and Markus Klemen.
Disaster Recovery and Business Continuity Planning.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
System Implementation
 Load balancing is the process of distributing a workload evenly throughout a group or cluster of computers to maximize throughput.  This means that.
Advanced Accounting Information Systems Day 19 Control and Security Frameworks October 7, 2009.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
10/11/20071 Business Continuity and Disaster Recovery Planning CMPE296T Fall 2007 Final Project Professor Richard Sinn Team Members Li Yang Smita Uniyal.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Business Continuity Management 101. KeepItSafe Professional Services The portfolio of business continuity management is to ensure we assist our clients.
Disaster Recovery. Refer to the process,policy and procedure related to recovery or continuation of technology infrastructure critical to an organization.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Disaster Recovery Management By: Chris Rozic COSC 481.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Business Continuity Planning 101
Service Design.
Dr. Ir. Yeffry Handoko Putra
CCNET Managed Services
Alabede, Collura, Walden, Zimmerman
Capitalize on modern technology
IS4680 Security Auditing for Compliance
Presentation transcript:

DRP Disaster Recovery Planning

Social Networking... It's the way the 21st century communicates today.

Online social networking, websites are commonly known as social sites. Social networking websites function like an online community of internet users. Depending on the website in question, many of these online community members share common interests in hobbies, religion, or politics. Once you are granted access to a social networking website you can begin to socialize.

Search Engine A web search engine is designed to search for information on the World Wide Web. The search results are generally presented in a list of results and are often called hits. The information may consist of web pages, images, information and other types of files. Some search engines also mine data available in databases or open directoriesWorld Wide Web web pages mine datadatabasesopen directories

A disaster recovery plan (DRP) — often referred to synonymously as a business continuity plan (BCP) — is a comprehensive set of measures and procedures put into place within an organization to ensure that essential, mission critical resources and infrastructures are maintained or backed up by alternatives during various stages of a disaster.

DRP must address three areas: Prevention (pre-disaster): The pre-planning required — using mirrored servers for mission critical systems, maintaining hot sites, training disaster recovery personnel — to minimize the overall impact of a disaster on systems and resources.hot sites Continuity (during a disaster): The process of maintaining core, mission-critical systems and resource "skeletons" (the bare minimum assets required to keep an organization in operational status) and/or initiating secondary hot sites during a disaster.. Recovery (post-disaster): The steps required for the restoration of all systems and resources to full, normal operational status. Organizations can cut down on recovery time by subscribing to quick-ship programs (third-party service providers who can deliver pre- configured replacement systems to any location within a fixed timeframe).

So, why a DRP? They protect an organization in many ways Provides a greater sense of security. Ensures a certain level of system and resource stability during a disaster. Minimizes system downtime and recovery time. Minimizes the risk of permanent loss of core assets or the entire organization. Minimizes confusion during a disaster. Minimizes the amount of decision-making during a high-stress time when emotions will be running high. Provides a platform in which to simulate various disaster recovery scenarios. Ensures the reliability of secondary systems such as hot sites and server

Auditing The specialised nature of information systems (IS) auditing, and the skills necessary to perform such audits, require standards that apply specifically to IS auditing. One of the goals of the Information Systems Audit and Control Association (ISACA) is to advance globally applicable standards to meet this need

Scope and Authority of IS Auditing Standards The framework for the IS Auditing Standards provides multiple levels of guidance: Standards define mandatory requirements for IS auditing and reporting. Guidelines provide guidance in applying IS Auditing Standards. The IS auditor should consider them in determining how to achieve implementation of the standards, use professional judgment in their application and be prepared to justify any departure. Procedures provide examples of procedures an IS auditor might follow in an audit engagement. Procedures should not be considered inclusive of any proper procedures and tests or exclusive of other procedures and tests that are reasonably directed to obtain the same results