1 / 18

Disaster Prevention and Recovery

Disaster Prevention and Recovery. Kristen Emch Christine Jennings-Garant. Introduction . Prevention, protection, and recovery are a crucial function to EVERY system or company. It is most important to operations within the system Not so much management Operations must have:

lew
Télécharger la présentation

Disaster Prevention and Recovery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant

  2. Introduction • Prevention, protection, and recovery are a crucial function to EVERY system or company. • It is most important to operations within the system • Not so much management • Operations must have: • Disaster prevention and recovery plans • Plans for back up

  3. Prevention/Protection • Prevention – the act of keeping something from happening • There are 4 main methods: • Redundancy • Hardware • Firewalls • Virus Protection

  4. Redundancy • Redundancy – a system design that makes duplicates to provide alternatives in case of failure • Devices, referred to as Secondary Storage, are used to create system duplicates: • Secondary storage – storing large amounts of data and instructions more permanently

  5. Redundancy • RAID (Redundant Array of Independent/Inexpensive Disks) • Allows system to make a “reconstruction map” to rebuild data • Multiple hard drives copy data so that if one drive fails, there is no single point of failure • Improves efficiency

  6. Redundancy • Software may be used to monitor or check the back-up system • Improves quality of the system • Valuable to keep copy of entire system at an external location • Disadvantage • If the back-up system isn’t monitored, the company will lose its redundancy • Ex. Kerr administration building, 2 mos. ago

  7. 2. Hardware • Consider the use of more expensive hardware • Higher mean time between failure (MBTF) • Better quality hardware lasts longer • Disadvantage • May not be financially possible

  8. 3. Firewalls • Used to protect from external threats • Break-ins or unauthorized access to the system • Servers vs. Workstations • Anyone can access a website (server) • Can set protocol levels of firewalls • Ex. No access to COB from outside • Other preventative measures include the use of identification numbers and passwords

  9. 4. Virus Protection *Viruses are the #1 type of attack on information systems • Used to prevent contamination of system • Internal personnel pulling external threats into system • Constantly monitors and protects • Should be frequently updated • Ex. Symantec updates online

  10. Recovery • Recovery – regaining or saving something lost • Naval helicopter crash

  11. Recovery • Make sure data are never compromised • Overlaps with redundancy • Ex: COB writes tapes and takes them offsite every night • Companies can be hired to do this job

  12. Testing • Removes the redundancy element • Anything can happen • Element of quality control (QC) • Stage problems

  13. COBIT • COBIT is an IT governance framework and supporting toolset • Allows managers to bridge the gap between control requirements, technical issues, and business risks • COBIT enables clear policy development and good practice for IT control throughout organizations

  14. COBIT • 2 for disaster prevention and recovery • DS 10- manage problems • DS 4 – ensure continuous service • RACI chart • Responsible • Accountable • Consulted • Informed

  15. COBIT DS-10 • RACI Chart

  16. COBIT DS-4 • RACI Chart

  17. Let’s Review… • There are 4 main types of prevention • Redundancy * • Hardware • Firewalls • Virus Protection • If the back up system is not kept track of, the system loses its redundancy

  18. Let’s Review… • Recovery is getting out of the problem once it’s too late • Make sure data are never compromised • COBIT is a tool that helps bridge the gap between requirements and risk

More Related