Security+ Guide to Network Security Fundamentals,...

65
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity

Transcript of Security+ Guide to Network Security Fundamentals,...

Page 1: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network

Security Fundamentals,

Fourth Edition

Chapter 13

Business Continuity

Page 2: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Objectives

• Define environmental controls

• Describe the components of redundancy planning

• List disaster recovery procedures

• Describe incident response procedures

Security+ Guide to Network Security Fundamentals, Fourth Edition 2

Page 3: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

What Is Business Continuity?

• Organization’s ability to maintain operations after a

disruptive event

• Examples of disruptive events

– Power outage

– Hurricane

– Tsunami

• Business continuity planning and testing steps

– Identify exposure to threats

– Create preventative and recovery procedures

– Test procedures to determine if they are sufficient

Security+ Guide to Network Security Fundamentals, Fourth Edition 3

Page 4: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

What Is Business Continuity? (cont’d.)

• Succession planning

– Determining in advance who is authorized to take

over if key employees die or are incapacitated

• Business impact analysis (BIA)

– Analyzes most important business functions and

quantifies impact of their loss

– Identifies threats through risk assessment

– Determines impact if threats are realized

Security+ Guide to Network Security Fundamentals, Fourth Edition 4

Page 5: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

What Is Business Continuity? (cont’d.)

• Questionnaires used to prompt thinking about

impact of a disaster

• In-person interviews held

– Discuss different disaster scenarios

– BIA interview form helps organize information

obtained from the interview

Security+ Guide to Network Security Fundamentals, Fourth Edition 5

Page 6: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 6

Table 13-1 BIA interview form

Page 7: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Disaster Recovery

• Subset of business continuity planning and testing

• Also known as contingency planning

• Focuses on protecting and restoring information

technology functions

• Mean time to restore (MMTR)

– Measures average time needed to reestablish

services

• Disaster recovery activities

– Create, implement, and test disaster recovery plans

Security+ Guide to Network Security Fundamentals, Fourth Edition 7

Page 8: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Disaster Recovery Plan

• Written document detailing process for restoring IT

resources:

– Following a disruptive event

• Comprehensive in scope

• Updated regularly

• Example of disaster planning approach

– Define different risk levels for organization’s

operations based on disaster severity

Security+ Guide to Network Security Fundamentals, Fourth Edition 8

Page 9: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 9

Table 13-2 Sample educational DRP approach

Page 10: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Disaster Recovery Plan (cont’d.)

• Common features of most disaster recovery plans

– Definition of plan purpose and scope

– Definition of recovery team and their responsibilities

– List of risks and procedures and safeguards that

reduce risk

– Outline of emergency procedures

– Detailed restoration procedures

• DRP should contain sufficient level of detail

Security+ Guide to Network Security Fundamentals, Fourth Edition 10

Page 11: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 11

Figure 13-1 Sample excerpt from a DRP © Cengage Learning 2012

Page 12: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Disaster Recovery Plan (cont’d.)

• DRP must be adaptable

• Backout/contingency option

– Component of a DRP

– If plan response is not working properly, technology

is rolled back to starting point

– Different approach taken

• Disaster exercises

– Designed to test DRP’s effectiveness

Security+ Guide to Network Security Fundamentals, Fourth Edition 12

Page 13: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Disaster Recovery Plan (cont’d.)

• Disaster exercise objectives

– Test efficiency of interdepartmental planning and

coordination in managing a disaster

– Test current DRP procedures

– Determine response strengths and weaknesses

Security+ Guide to Network Security Fundamentals, Fourth Edition 13

Page 14: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

• Single point of failure

– Component or entity which will disable the entire

system if it no longer functions

• Remove single point of failure

– Primary mechanism to ensure business continuity

– Results in high availability

• Expressed as a percentage uptime in a year

Security+ Guide to Network Security Fundamentals, Fourth Edition 14

Page 15: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 15

Table 13-3 Percentages and downtimes

Page 16: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Redundancy and fault tolerance

– Way to address single point of failure

– Building excess capacity to protect against failures

• Redundancy planning

– Applies to servers, storage, networks, power, sites

• Servers

– Play a key role in network infrastructure

– Failure can have significant business impact

Security+ Guide to Network Security Fundamentals, Fourth Edition 16

Page 17: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Some organizations stockpile spare parts for

servers

– Or have redundant servers

• Server cluster

– Multiple servers that appear as a single server

– Connected through public and private cluster

connections

• Types of server clusters

– Asymmetric

– Symmetric

Security+ Guide to Network Security Fundamentals, Fourth Edition 17

Page 18: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Asymmetric servers perform no function except to

be ready if needed

– Used for databases, messaging systems, file and

print services

• All servers do useful work in a symmetric server

cluster

– If one server fails, remaining servers take on failed

server’s work

– More cost effective than asymmetric clusters

– Used for Web, media, and VPN servers

Security+ Guide to Network Security Fundamentals, Fourth Edition 18

Page 19: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 19

Figure 13-2 Server cluster © Cengage Learning 2012

Page 20: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Hard drives

– Often first components to fail

– Some organizations keep spare hard drives on hand

• Mean time between failures (MTBF)

– Measures average time until a component fails and

must be replaced

– Can be used to determine number of spare hard

drives an organization should keep

Security+ Guide to Network Security Fundamentals, Fourth Edition 20

Page 21: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Redundant Array of Independent Devices (RAID)

– Uses multiple hard disk drives to increase reliability

and performance

– Can be implemented through software or hardware

– Several levels of RAID exist

• RAID Level 0 (striped disk array without fault

tolerance)

– Striping partitions hard drive into smaller sections

– Data written to the stripes is alternated across the

drives

– If one drive fails, all data on that drive is lost Security+ Guide to Network Security Fundamentals, Fourth Edition 21

Page 22: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 22

Figure 13-3 RAID Level 0 © Cengage Learning 2012

Page 23: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• RAID Level 1 (mirroring)

– Disk mirroring used to connect multiple drives to the

same disk controller card

– Action on primary drive is duplicated on other drive

– Primary drive can fail and data will not be lost

• Disk duplexing

– Variation of RAID Level 1

– Separate cards used for each disk

– Protects against controller card failures

Security+ Guide to Network Security Fundamentals, Fourth Edition 23

Page 24: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 24

Figure 13-4 RAID Level 1 © Cengage Learning 2012

Page 25: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• RAID Level 5 (independent disks with distributed

parity)

– Distributes parity (error checking) across all drives

– Data stored on one drive and its parity information

stored on another drive

• RAID 0+1 (high data transfer)

– Nested-level RAID

– Mirrored array whose segments are RAID 0 arrays

– Can achieve high data transfer rates

Security+ Guide to Network Security Fundamentals, Fourth Edition 25

Page 26: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 26

Figure 13-5 RAID Level 5 © Cengage Learning 2012

Page 27: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 27

Figure 13-6 RAID Level 0+1 © Cengage Learning 2012

Page 28: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 28

Table 13-4 Common RAID levels (continues)

Page 29: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 29

Table 13-4 Common RAID levels (cont’d.)

Page 30: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Redundant networks

– May be necessary due to critical nature of

connectivity today

– Wait in the background during normal operations

– Use a replication scheme to keep live network

information current

– Launches automatically in the event of a disaster

– Hardware components are duplicated

– Some organizations contract with a second Internet

service provider as a backup

Security+ Guide to Network Security Fundamentals, Fourth Edition 30

Page 31: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Uninterruptible power supply (UPS)

– Maintains power to equipment in the event of an

interruption in primary electrical power source

• Offline UPS

– Least expensive, simplest solution

– Charged by main power supply

– Begins supplying power quickly when primary power

is interrupted

– Switches back to standby mode when primary power

is restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 31

Page 32: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Online UPS

– Always running off its battery while main power runs

battery charger

– Not affected by dips or sags in voltage

– Can serve as a surge protector

– Can communicate with the network operating

system to ensure orderly shutdown occurs

– Can only supply power for a limited time

• Backup generator

– Powered by diesel, natural gas, or propane

Security+ Guide to Network Security Fundamentals, Fourth Edition 32

Page 33: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Sites

– Backup sites may be necessary if flood, hurricane,

or other major disaster damages buildings

– Three types of redundant sites: hot, cold, and warm

• Hot site

– Run by a commercial disaster recovery service

– Duplicate of the production site

– Has all needed equipment

– Data backups can be moved quickly to the hot site

Security+ Guide to Network Security Fundamentals, Fourth Edition 33

Page 34: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Cold site

– Provides office space

– Customer must provide and install all equipment

needed to continue operations

– No backups immediately available

– Less expensive than a hot site

– Takes longer to resume full operation

• Warm site

– All equipment is installed

– No active Internet or telecommunications facilities

Security+ Guide to Network Security Fundamentals, Fourth Edition 34

Page 35: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Redundancy and Fault Tolerance

(cont’d.)

• Warm site (cont’d.)

– No current data backups

– Less expensive than a hot site

– Time to turn on connections and install backups can

be half a day or more

Security+ Guide to Network Security Fundamentals, Fourth Edition 35

Page 36: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Data Backups

• Essential element in any DRP

• Copying information to a different medium and

storing offsite to be used in event of disaster

• Questions to ask when creating a data backup

– What information should be backed up?

– How often should it be backed up?

– What media should be used?

– Where should the backup be stored?

– What hardware or software should be used?

Security+ Guide to Network Security Fundamentals, Fourth Edition 36

Page 37: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Data Backups (cont’d.)

• Backup software

– Can internally designate which files have already

been backed up

• Archive bit set to 0 in file properties

– If file contents change, archive bit is changed to 1

• Types of backups

– Full backup

– Differential backup

– Incremental backup

Security+ Guide to Network Security Fundamentals, Fourth Edition 37

Page 38: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 38

Figure 13-7 Archive bit © Cengage Learning 2012

Page 39: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 39

Table 13-5 Types of data backups

Page 40: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Data Backups (cont’d.)

• Recovery point objective (RPO)

– Maximum length of time organization can tolerate

between backups

• Recovery time objective (RTO)

– Length of time it will take to recover backed up data

• Magnetic tape backups have been standard for

over 40 years

– Can store up to 800GB of data

– Relatively inexpensive

Security+ Guide to Network Security Fundamentals, Fourth Edition 40

Page 41: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Data Backups (cont’d.)

• Disadvantages of magnetic tape backups

– Slow backup speed

– High failure rates

– Data not encrypted on tape

• Disk to disk

– Large hard drive or RAID configuration

– Better RPO and RTO than magnetic tape

– May be subject to failure or data corruption

Security+ Guide to Network Security Fundamentals, Fourth Edition 41

Page 42: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Data Backups (cont’d.)

• Disk to disk to tape

– Uses magnetic disk as a temporary storage area

– Server does not need to be offline for an extended

time period

– Data later transferred to magnetic tape

• Continuous data protection

– Performs data backups that can be restored

immediately

– Maintains historical record of all changes made to

data

Security+ Guide to Network Security Fundamentals, Fourth Edition 42

Page 43: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 43

Table 13-6 Continuous data protection types

Page 44: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 44

Table 13-7 Data backup technologies

Page 45: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Environmental Controls

• Methods to prevent disruption through

environmental controls

– Fire suppression

– Proper shielding

– Configuring HVAC systems

Security+ Guide to Network Security Fundamentals, Fourth Edition 45

Page 46: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Fire Suppression

• Requirements for a fire to occur

– Fuel or combustible material

– Oxygen to sustain combustion

– Heat to raise material to its ignition temperature

– Chemical reaction: fire itself

Security+ Guide to Network Security Fundamentals, Fourth Edition 46

Page 47: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 47

Figure 13-8 Fire triangle © Cengage Learning 2012

Page 48: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 48

Table 13-8 Using incorrect fire suppression systems

Page 49: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 49

Table 13-9 Fire types

Page 50: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 50

Table 13-10 Stationary fire suppression systems (continues)

Page 51: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 51

Table 13-10 Stationary fire suppression systems (cont’d.)

Page 52: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Electromagnetic Interference (EMI)

Shielding

• Attackers could pick up electromagnetic fields and

read data

• Faraday cage

– Metal enclosure that prevents entry or escape of

electromagnetic fields

– Often used for testing in electronic labs

Security+ Guide to Network Security Fundamentals, Fourth Edition 52

Page 53: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

HVAC

• Data centers have special cooling requirements

– More cooling necessary due to large number of

systems generating heat in confined area

– Precise cooling needed

• Heating, ventilating, and air conditioning (HVAC)

systems

– Maintain temperature and relative humidity at

required levels

• Controlling environmental factors can reduce

electrostatic discharge

Security+ Guide to Network Security Fundamentals, Fourth Edition 53

Page 54: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

HVAC (cont’d.)

• Hot aisle/cold aisle layout

– Used to reduce heat by managing air flow

– Servers lined up in alternating rows with cold air

intakes facing one direction and hot air exhausts

facing other direction

• Location of computer data center an important

consideration

– Placing a wireless access point in a plenum can be a

hazard

Security+ Guide to Network Security Fundamentals, Fourth Edition 54

Page 55: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Incident Response Procedures

• When unauthorized incident occurs:

– Response is required

• Incident response procedures

– Can include using basic forensics procedures

Security+ Guide to Network Security Fundamentals, Fourth Edition 55

Page 56: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

What Is Forensics?

• Applying science to legal questions

– Analyzing evidence

• Computer forensics

– Uses technology to search for computer evidence of

a crime

• Reasons for importance of computer forensics

– Amount of digital evidence

– Increased scrutiny by the legal profession

– Higher level of computer skill by criminals

Security+ Guide to Network Security Fundamentals, Fourth Edition 56

Page 57: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Basic Forensics Procedures

• Four basic steps are followed

– Secure the crime scene

– Collect the evidence

– Establish a chain of custody

– Examine for evidence

• Secure the crime scene

– Goal: preserve the evidence

– Damage control steps taken to minimize loss of

evidence

Security+ Guide to Network Security Fundamentals, Fourth Edition 57

Page 58: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Basic Forensics Procedures (cont’d.)

• Secure the crime scene (cont’d.)

– First responders contacted

– Physical surroundings documented

– Photographs taken before anything is touched

– Computer cables labeled

– Team takes custody of entire computer

– Team interviews witnesses

Security+ Guide to Network Security Fundamentals, Fourth Edition 58

Page 59: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Basic Forensics Procedures (cont’d.)

• Preserve the evidence

– Digital evidence is very fragile

• Can be easily altered or destroyed

– Computer forensics team captures volatile data

• Examples: contents of RAM, current network

connections

– Order of volatility must be followed to preserve most

fragile data first

– Capture entire system image

– Mirror image backup of the hard drive

• Meets evidence standards

Security+ Guide to Network Security Fundamentals, Fourth Edition 59

Page 60: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 60

Table 13-11 Order of volatility

Page 61: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Basic Forensics Procedures (cont’d.)

• Establish the chain of custody

– Evidence maintained under strict control at all times

– No unauthorized person given opportunity to corrupt

the evidence

• Examine for evidence

– Computer forensics expert searches documents

– Windows page files can provide valuable

investigative leads

– Slack and metadata are additional sources of hidden

data

Security+ Guide to Network Security Fundamentals, Fourth Edition 61

Page 62: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 62

Figure 13-10 RAM slack © Cengage Learning 2012

Page 63: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Security+ Guide to Network Security Fundamentals, Fourth Edition 63

Figure 13-11 Drive file slack © Cengage Learning 2012

Page 64: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Summary

• Business continuity is an organization’s ability to

maintain its operations after a disruptive event

• Disaster recovery

– A subset of business continuity planning

– Focuses on restoring information technology

functions

– Disaster recovery plan details restoration process

• A server cluster combines two or more servers that

are interconnected to appear as one

• RAID uses multiple hard disk drives for redundancy

Security+ Guide to Network Security Fundamentals, Fourth Edition 64

Page 65: Security+ Guide to Network Security Fundamentals, …cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch13.pdf•Continuous data protection –Performs data backups that can be restored

Summary (cont’d.)

• Network components can be duplicated to provide

a redundant network

• Data backup

– Copying information to a different medium and

storing (preferably offsite) for use in event of a

disaster

• Recovery point objective and recovery time

objective help an organization determine backup

frequency

• Fire suppression systems include water, dry

chemical, and clean agent systems Security+ Guide to Network Security Fundamentals, Fourth Edition 65