ImageVerifierCode 换一换
格式:PPT , 页数:26 ,大小:252KB ,
资源ID:389570      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-389570.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Systems Availability and Business Continuity.ppt)为本站会员(arrownail386)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

Systems Availability and Business Continuity.ppt

1、Systems Availability and Business Continuity,Chapter FourPrepared by: Raval, Fichadia,Raval Fichadia John Wiley & Sons, Inc. 2007,Chapter Four Objectives,Understand system availability and business continuity, and recognize differences between the two.Comprehend incident response systems and their r

2、ole in achieving the system availability objective.Explain disaster recovery planning objectives and its, design, implementation and testing requirements.Comprehend the link between business continuity and disaster recovery.Understand the role of backup and recovery in disaster recovery plans.,Power

3、 outage at Northwest Airlines,Thunderstorm and lightening at the datacenter location caused the problem. Systems, down initially, operated in a degraded manner the next morning. Took very long to check people in flights. NWA triggered manual processes. Lines became longer and so did the delays in de

4、parture. Arrivals were late, but the departures from gates at the destination airport made the flights to wait before they could get to the gate. NWA announced an embargo, limiting itself to what it can handle under the circumstances.,System Availability and Business Continuity,System availability a

5、ssures you that business will continue to operate. Business continuity is necessary for systems to add value on an ongoing basis. The issues of business continuity and systems availability are related and even overlap to a degree.,Incident Response,Incident: A level of interruption in the system ava

6、ilability that appears to be temporary. An incident can be triggered by an accidental action by an authorized user, it may result from a threat. Incidents may be detected by: End-users who may describe the symptom but not the cause. Those monitoring systems and processes may detect anomalies which l

7、ead to an incident that has occurred. Attack: A series of steps taken by an attacker to achieve an unauthorized result. Event: An action directed at a target that is intended to result in a change of state, or status, of the target. An event consists of an action and a target.,Nature of Response to

8、an Incident,Assess the business significance of the incidents impact. Identify critical business processes that might have been compromised. Determine the root causes of the incident. This might present a challenge, for every incident could be of a different variety. The team may need to consult exp

9、erts from outside the team. Training in forensics could help the team collect and evaluate evidence systematically. Standard procedures must be followed for restoring the affected systems and processes, instead of ad hoc, one-off attempts to restore what is compromised or lost.,Preventive Measures,P

10、revention is better and could be more cost effective - than a cure. Preventive measures require an anticipation or prediction of what might happen in terms of incidents and consequent compromises. Lessons learned from the organizations and from others experiences can help design and implement effect

11、ive preventive measures.,Incident Response Team,A multi-skilled group, since the incident may be any variety and may impact almost any information asset. May include representation from human resources, legal, information systems, networks and communications, physical security, information security,

12、 and public relations. A top management team member may be designated as a direct contact for counseling and support.,CERT,CERT stands for Computer Emergency Readiness Team. Also called CERT Coordination Center (CERT CC), it is the Internets official emergency team. Provides alerts and offers incide

13、nt handling and avoidance guidelines. Is located at Carnegie-Mellon University. www.cert.org,Disaster Recovery,Disaster: An event that causes a significant and perhaps prolonged disruption in system availability. Disasters can be man-made or natural. Man-made disasters can be malicious or unintentio

14、nal. Disaster recovery is a systematic effort to recover from the impact of a disaster. Best way to understand recovery is by focusing on post-disaster phases. Post-disaster phases Immediate response Near-term resumption Recovery toward normalization Restoration to pre-disaster state,Timeliness of A

15、ction and Value of Recovery,Timeliness of action The timeline of actions planned should reflect value of the action at the time. Certain steps can wait while others must be taken without delay, to minimize losses. Value of recovery Timeliness of action reflects value of the recovery target. Consider

16、ing this, recovery tasks should be systematically assigned to each post-disaster phase.,Disaster Recovery Planning (DRP),DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation of strategies for reducing the likelihood of interruption

17、 or its consequences. Component steps of DRP: Define the process Identify what supports the process and its tolerance to interruptions Determine and implement strategies that would reduce the likelihood and cosequences of interruptions.,Disaster Recovery Planning (DRP),Assessing potential losses: Di

18、saster Impact Analysis What disasters the firm is likely to face? What is the probability of each type of disaster? What is the impact of the disaster on the firm?,Disaster Recovery Planning (DRP),Value-based recovery planning Definition of criticality and criteria to determine criticality Identific

19、ation of critical business processes and their supports Identification of the role of information systems resources in the critical process Determination of process owners and process customers Determination of the amount of time the business can survive without the process post-disaster Identify in

20、terdependencies between the process and the rest of the business processes and systems To find critical processes, consider attributes such as importance, key users, tolerance to outage, waiting time between cycles, possibility of data recovery.,Disaster Recovery Planning (DRP),Disaster recovery str

21、ategies How do we recover a system given its priority? Address the question by system components. Data (e.g., designate off-site storage) Processing (e.g., backup and store offsite current copies of the software) Network and communication (e.g., backup and store offsite a copy the current network co

22、nfiguration) Dependencies with other systems (e.g., identify how these processes will be interfaced post-disaster),DRP: Recovery Locations,Recovery location: A site(s) where processes and systems will be recovered post-disaster. Hot sites: Near-perfect replicas of the operations. Cold sites: Just th

23、e infrastructure (computer operations room, platform for installing hardware, power and communication lines, cabling, etc.). Warm sites: More than just a cold site, but not quite as ready as a hot site. For example, it may include commonly used computers and operating system. Reciprocal agreements:

24、Sharing of similar resources by those in the same or similar computing enviornments. Colocations: Recovery is planned using availability of computing resources at the firms many locations.,DRP: Teams,Purpose of forming teams is to ensure that recovery tasks are accomplished in an orderly and respons

25、ible manner. The number and nature of teams could vary across organizations. However, each team should include knowledge and skills necessary to perform its assigned tasks. Recovery teams can be organized by recovery phases. Flexibility in assignments is necessary, for an actual disaster may need ad

26、justments to the team. Non-availability of some team members when disaster strikes is also likely.,DRP: Disaster Readiness,Meaning of readiness: Having the assurance that if and when a disaster strikes, the firm has a high likelihood of recovering from the disaster. Testing of the plan is crucial to

27、 get this assurance. Disaster readiness practices include: Walkthroughs: Having a plan preparer walk though others to show how the plan leads from point A to point B. Rehearsals: An “as-if” exercise to simulate a disasters impact and have people responsible recreate recovery of “lost” processes and

28、systems. Compliance (Live) testing: Actual test of recovery with a simulated disaster.,Business Continuity Planning (BCP),BCP: The totality of plans made to recover the business operations following a disaster. Recovery of all operations is involved, not just information assets. Methods and strategi

29、es adopted for BCP are comparable to, and often overlap with, those used in DRP.,Business Continuity Planning (BCP),Business impact analysis is an exercise in risk assessment. Identify vulnerabilities of the firm. Assess the business impact Focus on a particular disaster and determine processes that

30、 might be affected, and/or Analyze all business processes to assess probable business impact in the event that a disaster strikes. Initiate a planning process to develop methods and strategies to mitigate risk. Business recovery Approaches and methods for business recovery are similar to those discu

31、ssed in disaster recovery planning.,Assurance Considerations,Any assurance that BCP/DRP will be effective requires an examination of such plans from three angles: Method: Review the method followed in the development of the plan. A sound planning process make possible a plan that is complete and rel

32、iable. Content: Should have been collected from “right” participants, and the instruments and methods used to collect data must be valid. The plan should be current. Testing: Critical components of the plan should be tested, results should be documented, and corrective action, where necessary, should follow.,

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1