Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
-
Upload
godwin-johns -
Category
Documents
-
view
216 -
download
0
Transcript of Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
![Page 1: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/1.jpg)
Chapter 16Chapter 16
Presented By:Presented By:Stephen LambertStephen Lambert
Disaster Recovery and Business Disaster Recovery and Business ContinuityContinuity
![Page 2: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/2.jpg)
Business Continuity
Purpose: To develop a solid disaster recovery plan that will allow the business to continue through what ever catastrophic event that may occur.
Redundancy
![Page 3: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/3.jpg)
Disaster Recovery Plan
A disaster recovery plan defines the resources, actions, and data required to reinstate critical business processes that have been damaged or disabled because of a disaster.
5 Potential Threats or Disasters
• Human induced accidents
• Natural
• Internal
• Armed conflict
• External
An effective Disaster Recovery Plan should include:
1. A list of the covered disasters.
![Page 4: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/4.jpg)
Disaster Recovery Plan cont…
2. A list of the disaster recovery team members for each type of situation and their contact information.
Team Members
• Senior Management
• Information Technology Department
• Facilities Management
• User Community3. Business Impact Assessment
4. Business Resumption and Continuity Plan
5. Backup Documentation
6. Restore Documentation
![Page 5: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/5.jpg)
Data Backups
All mission-critical data is critical to allow personnel to restore files and application software and continue business.
Key Issues of Backup Strategy:
• How often should the backups be run?
• What is the backup medium?
• What time of day should the backups be run?
• Are the backups manual or automated?
• How are backups verified?
• How long are backups stored?
• Where are backups stored?
• Who is responsible for backups?
• Who is the fallback person responsible for backups?
![Page 6: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/6.jpg)
Security Policy
Acceptable Use Policy – policies that are concerned with the use of computer equipment and network resources for personal use or use that is not benefiting the company.
Privacy – protect customer and supplier data
Separation of Duties – effectively distribute tasks throughout the IT organization and document processes thoroughly.
Password Management – attributes: minimum length, allowed character set, disallowed strings (all numbers, dictionary words, variations of the username or ID), and the duration of use of the password.
Service Level Agreements – is a contractual understanding between and ASP and the end user which binds the ASP to a specified and documented level of service.
Disposal and Destruction
![Page 7: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/7.jpg)
Human Resources Policy
Employee Hiring – Hiring of personnel for computer network or security functions require verifying the candidate’s background, including reference checks, previous employers, criminal background checks, and relevant educational background.
Employee Termination -- protect against disgruntled employees
Code of Ethics – the code should demand that employees act honestly, responsibly, and legally to protect the organization.
![Page 8: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/8.jpg)
Incident Response Policy -- covers how to deal with a security incident after it has already transpired.
Six Distinct Steps:
• Preparation• Detection• Containment• Eradication• Recovery• Follow Up
Human Resources Policy cont…
![Page 9: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/9.jpg)
http://www.webseminarslive.com/article2/0,2290,1553527,00.asp
![Page 10: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/10.jpg)
![Page 11: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/11.jpg)
![Page 12: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/12.jpg)
![Page 13: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/13.jpg)
![Page 14: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/14.jpg)
![Page 15: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/15.jpg)
![Page 16: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/16.jpg)
![Page 17: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/17.jpg)
![Page 18: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/18.jpg)
![Page 19: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/19.jpg)
![Page 20: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/20.jpg)
![Page 21: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/21.jpg)
![Page 22: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/22.jpg)
![Page 23: Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.](https://reader036.fdocuments.in/reader036/viewer/2022062423/5697bf831a28abf838c86a46/html5/thumbnails/23.jpg)