Presentation is loading. Please wait.

Presentation is loading. Please wait.

This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.

Similar presentations


Presentation on theme: "This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to."— Presentation transcript:

1 This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to accompany the courseware may be copied, photocopied, reproduced, or re-used in any form or by any means without permission in writing from a director of gtslearning International Limited. Violation of these laws will lead to prosecution. All trademarks, service marks, products, or services are trademarks or registered trademarks of their respective holders and are acknowledged by the publisher. All gtslearning products are supplied on the basis of a single copy of a course per student. Additional resources that may be made available from gtslearning may only be used in conjunction with courses sold by gtslearning. No material changes to these resources are permitted without express written permission by a director of gtslearning. These resources may not be used in conjunction with content from any other supplier. If you suspect that this course has been copied or distributed illegally, please telephone or email gtslearning. 5.5 Disaster Recovery CompTIA Server+ Certification (Exam SK0-004)

2 Objectives Develop effective Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) Understand the importance of fault tolerance and identify the main components that require redundancy Understand the use of clusters, load balancing, and replication methods to maintain hot, cold, and warm sites 5.5 Disaster Recovery 429

3 Business Impact Analysis Identify the critical functions or processes of the business or organization Identify the assets and resources on which the organization depends Identify threats to the organization's functions and assets Assess the risk to each function or asset, given the threats 5.5 Disaster Recovery 429

4 People (employees, visitors, and suppliers) Tangible assets (buildings, furniture, equipment and machinery (plant), ICT equipment, electronic data files, and paper documents) Intangible assets (ideas, commercial reputation, brand, and so on) Procedures (supply chains, critical procedures, standard operating procedures) Asset tagging / Radio Frequency ID (RFID) Classification / impact of loss Identification of Critical Systems 5.5 Disaster Recovery 430

5 Threats due to assets (insider and outsider threat actors) Non-specific threats (natural disaster) External impacts (public infrastructure, threats to customers) Threat Identification 5.5 Disaster Recovery 431

6 Risk Calculation Likelihood and impact Quantitative versus qualitative assessments o Single Loss Expectancy (SLE) o Exposure Factor (EF) o Annual Loss Expectancy (ALE) o Annual Rate of Occurrence (ARO) o Traffic light grid o Security Categorizations − Low − Medium − High 80:20 “Pareto Principle” – fix the big things first 5.5 Disaster Recovery 431

7 Identify scenarios o Risk and cost assessment o Threat modeling Identify tasks, resources, and responsibilities for response Train staff in disaster recovery and change management Disaster Recovery Planning 5.5 Disaster Recovery 433

8 After a disaster the focus may lie too much on availability at the expense of confidentiality and integrity Security of backup data sets stored on spares or at alternate sites Security of systems following a recovery operation Secure Recovery 5.5 Disaster Recovery 434

9 Minimize or eliminate Single Points of Failure Fault Tolerance o Systems and procedures that can provide the same (or nearly) level of service despite “incidents” o Redundant / fail-over components (RAID, PSU, network links) o UPS / standby power o Backup IT Contingency Planning 5.5 Disaster Recovery 435

10 Load balancing network links o Adapter teaming o More bandwidth (except during failover) o Design network with multiple paths Power supply o Uninterruptible Power Supply (UPS) for battery backup o Backup generator Cooling fans Hardware and spare parts Redundant Components 5.5 Disaster Recovery 435

11 Clusters Provide fault tolerant servers Configure nodes for failover Active / Active Active / Passive 5.5 Disaster Recovery 437

12 Redundant equipment o Disks o Servers o Sites Classification o Hot (online or near online) o Warm (might require configuration / loading with data) o Cold (resource is available but will need commissioning) Balance risk against cost Spares and Sites 5.5 Disaster Recovery 439

13 Duplicating data between servers or sites Synchronous – data must be written to both locations before it is “committed” Asynchronous – one site receives a copy from the primary site Consider risk, distance, cost Replication 5.5 Disaster Recovery 440

14 Review Develop effective Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) Understand the importance of fault tolerance and identify the main components that require redundancy Understand the use of clusters, load balancing, and replication methods to maintain hot, cold, and warm sites 5.5 Disaster Recovery 441


Download ppt "This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to."

Similar presentations


Ads by Google