80 likes | 164 Views
This guide delves into Security and Disaster Recovery practices, encompassing objectives, vulnerabilities, methods, and checklists for safeguarding against intrusions and ensuring effective recovery protocols. It covers physical and data security, access control, disaster types, recovery planning strategies, and more.
E N D
Security Objectives • Balance between effectiveness and difficulty to use • Difficult to intrude • Detect intrusion • Prevent alteration of info
Vulnerabilities Passwords Records (paper/data) Dial-upShared TransmissionEquipment rooms/closets Remote Access Access to Databases Others?
Methods • Physical • Lock/keys • Terminal/Server locked • Limiting access • Encryption • Authentication • Log-in Procedures/Passwords • Transaction Audits • Others?
Security Checklist • Procedures (operational/personnel/emergency) • Access Control • Information Control • Personnel/property safeguards
Abuse • Internal or external • Intentional or unintentional
Disaster Recovery • What is a disaster? • Fire • Flood • Acts of God • Theft • Malicious destruction • Loss of access or data • Compromised data
Disaster Recovery Plan • Define the particular disaster • Determine impact ($) • Develop emergency plan (per disaster) • Immediate actions/responsibilities • Develop backup plan • Develop recovery plan