1 / 22

Ensuring Continuing Operations and Disaster Recovery

Ensuring Continuing Operations and Disaster Recovery. By: Alyssa Gatrell Mike Harker Amy Shumway. What are the Threats?. Natural disasters Power failures Hardware failures Theft of assets and data Hacking Virus infections Departure of key personnel or disgruntled employees.

zeal
Download Presentation

Ensuring Continuing Operations and Disaster Recovery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ensuring Continuing Operationsand Disaster Recovery By: Alyssa Gatrell Mike Harker Amy Shumway

  2. What are the Threats? • Natural disasters • Power failures • Hardware failures • Theft of assets and data • Hacking • Virus infections • Departure of key personnel or disgruntled employees

  3. What is Ensuring Continuing Operations? • Preventative measures to ensure that a system is not disrupted by potential threats. • Uninterruptible power sources • Storage measures • Measures to protect from departure of key personnel • Measures to protect from disgruntled former employees • Physical security measures • Virus protection • Firewalls • Encryption

  4. What is a Virus? • A piece of self-replicating code

  5. Kinds of Viruses • Boot Sector Viruses • Macro Viruses

  6. Identifying the Threat • Floppy disk brought in • PC’s taken home or on business (laptops) • Increased use of e-mail • Increased use of the Internet

  7. Minimizing the Virus Threat • Regular backups of data • Check all incoming software • Write-protect floppy disks whenever possible

  8. Anti-Virus Tools • Floppies • “Sheep-dip” • PC’s • On-access scanners • On-demand scanners • Behavior blockers • Heuristic analysis

  9. Functions of a Firewall • Controller • Filter • Monitor • Security guard • Screener

  10. How Firewalls Work • Firewalls are like gatehouses in a medieval castle that provide perimeter defenses to determine who or what will be allowed to enter Inner Mote and Wall Gatehouses Castle Outer wall Illustration taken from Disaster Recovery Journal Winter 1999 Commons/Market Area

  11. Types of Firewalls • Dual-Home Gateway • Screened-Host Gateway • Screened Subnet • Dual-Homed Routers

  12. Dual-Home Gateway Internet Private Network Bastion Host

  13. Screened-Host Gateway Private Network Internet Router Bastion Host

  14. Screened Subnet Internet Router Router Sub-network Private Network

  15. Dual-Homed Routers Internet Outside Router Inside Router Private Network

  16. Other Thoughts on Firewalls • Internal firewalls are as important as external firewalls • Not the answer to total protection • Firewalls come in degrees of protection and complexity. • Companies should measure risk with costs of implementation and maintenance

  17. Encryption • Alters information into an unintelligible format to prevent unauthorized access • Can only be decrypted with specified digital key • Prevents against data theft as it is passed from one person to another

  18. What is Disaster Recovery? • Measures taken before a disaster that can lead to a successful reimplementation of systems • Backup regimen • Redundant hardware • Recovery facilities • Backup phone lines

  19. Process for Determining Backup Needs • Step 1: Location identification • Step 2: Establish criticality of data • Step 3: Select backup medium • Factors • Quantity of data • Speed of backing up • Ease of recovery

  20. Possible Mediums • Removable disks • Second hard drive / PC • Magnetic tape cartridges • Optical disks • Online services • Storage area network (SAN)

  21. Implementation Procedures • Scheduling intervals and time of day • Verification • Media stocks and rotation • Two sets • Extra media • Source documentation • Storage • Away from destructive force • Off-site location

  22. All Measures Should be Tested • Backup restoration • Firewall penetration testing • Intermittent checks of backup power

More Related