1 / 18

Disaster Planning and Security Policies

Disaster Planning and Security Policies. Threats to data. Deliberate Terrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire, Accidental altering of data Natural disasters. Companies must. Ensure data, hardware and software is not lost or damaged.

ilarson
Download Presentation

Disaster Planning and Security Policies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Disaster Planning and Security Policies

  2. Threats to data Deliberate • Terrorism • Criminal vandalism/sabotage • White collar crime Accidental • Floods and fire, • Accidental altering of data • Natural disasters

  3. Companies must • Ensure data, hardware and software is not lost or damaged. • Restore communication systems as quickly as possible. Consequences • Loss of business and income • Loss of reputation • Legal action

  4. Deliberate • Terrorism e,g Oklahoma bomber Oklahoma Federal Building on April 19th, 1995 destroyed federal records. • Criminal vandalism/sabotage e.g. the deliberate destruction of network servers by putting on viruses. • Theft of data by employees to sell to competitors • White collar crime such as the deliberate altering of data in a database e,g, transferring funds from company accounts into private accounts.

  5. Accidental • Floods and fire, e.g when the Buncefield oil terminal blew up it destroyed the company records in a nearby industrial estate • Accidental altering of data e.g. by inexperienced employees deleting an order in a customer files • Natural disasters such as the Tsunami destroyed population birth death bank records.

  6. How to prevent accidental loss • Accidental destruction of files due to fire, terrorism, floods • Backup systems must be described • keep back up files - offsite - and in fireproof containers • use an online tape or disc streamer which automatically backs up data on a network • use grandfather father son security system in batch processing systems. e.g. payroll • RAID systems – mirror discs (Redundant Array of Inexpensive Disc) • Accidental destruction of files due to human error etc. • Validation and verification measures • Prevent overwriting • put the write protect notch on your disc • make hard discs read only

  7. Prevention of malicious damage • Hacking unauthorised access • Spreading of a computer crime • Computer fraud • Physical destruction by vandalism and terrorism

  8. Hacking – unauthorised access • Prevention • Define security status and access rights for users • All authorised users should be given user names and passwords. This will limit unauthorised access to the network. • Hierarchy of Passwords • Identification User Name • Authentification Password • Authorisation What files you can see and what your allowed to do • Restrict physical access to filese.g. smart cards to control entrance to rooms. Secured areas to hold servers

  9. Prevention of malicious damage……Hacking Cont. • Biometric scanssuch as voice or hand prints; retina scans; • Firewalls.a special environment set up to trap a hacker logging in over remote connections. It authenticates messages coming into the network and verifies the legitimacy of the user to enter the network. • Proxy servers • This device tries to stop intruders from identifying the IP (Internet Protocol) address of a user workstation accessing the Internet.

  10. Prevention of malicious damage……Hacking Cont. • Call Back procedures • Some companies operate a dial-back system. A user logs on to a computer which immediately disconnects the line and dials the user back. This would stop a user logging on with someone else's password. • Encryption • Data transmitted over a network is coded before transmission. This means that anybody intercepting the transmitted data would not be able to understand it. The data needs to be de-coded by the proper recipient.

  11. Spreading a computer virus • These are programs introduced into computer systems which destroy or alter files by rewriting over data or by copying themselves over and over again until computer system is full and cannot continue. • Prevention • Don’t’ download unknown programs from the Internet straight to hard disc. Only use reputable sources. • Write protect media so can’t be written onto • Don’t copy illegal software • Use a virus scanning software and virus eradication program. Make sure this is kept up to date with the latest virus definitions – available from the Internet. • Use diskless workstations on networks

  12. Computer fraud – white-collar crime • Bogus data entry when entering data • Bogus output -output may be destroyed to prevent discovery of fraudulentdata entry or processing • Alteration of files e.g. employee alters salary rate or hours worked • Prevention or ‘White Collar’ computer crimes • Monitor all programs and users actions should be monitored and logged. All users should be identifiable and all files capable of being audited keep online transaction logs • Auditing procedures to detect fraud

  13. The factors to take into account when designing security policies • Physical security • Prevention of misuse • Availability of an alternative computer system and back up power supply • Audit trails for detection • Continuous investigation of irregularities • System Access - establishing procedures for accessing data such as log on procedures, firewalls • Operational procedures • Disaster recovery planning and dealing with threats from viruses • Personnel administration • Staff code of conduct and responsibilities; staff training • Policy and maintenance staff available. • Disciplinary procedures.

  14. Operational Procedures • Disciplinary procedures. • Screening potential employees • Routines for distributing updated virus information and virus scanning procedures • Define procedures for downloading from the Internet, use of floppy discs, personal backup procedures • Establish security rights for updating web pages • Establish a disaster recovery programme • Set up auditing procedures (Audit trails) to detect misuse.

  15. Three phases of a Disaster Recovery Plan Factors determining how much a company spends to develop control, minimising risk.

  16. 1. What to do before? • Do a ‘risk analysis’ of potential threats • Identify potential risks • Likelihood of risk occurring • Short and long term consequences of threat • How well equipped is the company to deal with threat • Put preventive measures in place. • Establish physical protection system (firewalls etc.) • Establish security rights for file access and updating web pages • Establish a disaster recovery programme • Set up auditing procedures (Audit trails) to detect misuse • Staff training in operational procedures. • Screening potential employees • Routines for distributing updated virus information and virus scanning procedures • Define procedures for downloading from the Internet, use of floppy discs, personal backup procedures • .Define staff code of conduct for using computer systems e.g. no abusive emails. No illicit use etc.

  17. 2. What to do during? • What response should staff make when the disaster occurs? 3. What to do after? Implement recovery measures • Hardware can be replaced. • Software can be re-installed. (or de-bugged by the programming department). • The real problem is the data. No business can afford to lose its data. • Backups of all data should be regularly made. This means that the worst case scenario is that the business has to go back to the situation of the last backup and carry on from there. Backups may take a long time - often tape-streamed at night. • Alternative communication /computer systems may be arranged in case a network goes down or alternative power supply.

More Related