SlideShare uma empresa Scribd logo
1 de 20
"In the name of God, the Most Gracious, the Most Merciful"
The Power of PowerPoint - thepopp.com
2
Context:
1 Importance
Disaster Recovery Plan
2 Cause and effects
Disaster & its Types
3 Important part of business
Business Continuity Plan
example
AT&T Network Collapse
5 Practical
Public Wi-Fi Data Capture
4
Disaster
Recovery Plan
Introduction The Disaster Recovery Plan (DRP) captures all of the information that
describes organization’s ability to withstand a disaster as well as the
processes that must be followed to achieve disaster recovery.
The Power of PowerPoint - thepopp.com
5
Disaster
Disaster identify an event that includes three
elements:
• Suddenness
• Unexpectedness
• Significant destruction and/or adverse
consequences
A fourth element, lack of foresight or planning, is
sometimes added.
What is a disaster?
The Power of PowerPoint - thepopp.com
6
Types of disaster:
Disaster is classified into two main types:
Natural disaster:
A natural hazard is a natural process or
phenomenon that may cause loss of life, injury
or other health impacts etc.
• Earthquakes
• Volcanos
Man Made Disaster:
The disasters themselves could be
unintentional, but, are caused due to some
intentional activity.
• Chemical Leaks/Spill over
• Terrorist Activities
Business
Continuity Plan
The Power of PowerPoint - thepopp.com
8
 A business continuity plan (BCP) is a plan to
help ensure that business processes can
continue during a time of emergency or disaster.
 Businesses need to look at all such potential
threats and plan BCPs to ensure continued
operations should the threat become a reality.
 In BCPs you need to establish recovery time
objectives (RTOs) and recovery point
objectives (RPOs).
RTO & RPO
RTO stands for recovery time objective,
which is the duration of time in which a
business must restore normal system recovery
to avoid consequences that can not only break
business continuity but also cause financial
loss.
RPO stands for recovery point objective,
which is the time that a disruption occurs
before the maximum acceptable data loss that
can be tolerated is reached. This means data
loss to the point where disruption can be
caused to the general running of the business.
Business
Continuity
Plan Life
Cycle
The business continuity
life cycle includes
components such as
Identify, Analyze, Design,
and Execute.
The Power of PowerPoint - thepopp.com
AT&T
Network
Collapse
AT&T
Network in 1990
The Power of PowerPoint - thepopp.com
13
AT&T's long-distance network was a model of reliability
and strength. It carried over 70% of the nation's long-
distance traffic, route over 115 million telephone calls.
But some thing happen in 1990,At 2:25pm on Monday,
January 15th,Within seconds, the giant 72 screen video
array that graphically represented the network was
crisscrossed with a tangle of red lines as a rapidly
spreading malfunction leapfrogged from one computer-
operated switching center to another. They try to bring the
network back, AT&T alone lost more than $60 million in
unconnected calls.
The Power of PowerPoint - thepopp.com
14
Reason Behind the
Crash
The cause of the problem had come months before. In early December,
technicians had upgraded the software to speed processing of certain types
of messages. Although the upgraded code had been rigorously tested, a one-
line bug was inadvertently added to the recovery software of each of the 114
switches in the network.
The defect was a C program that featured a break statement located within
an if clause, that was nested within a switch clause.
The Power of PowerPoint - thepopp.com
15
The Power of PowerPoint - thepopp.com
16
Disaster Recovery
AT&T's Network Disaster Recovery program was formed in 1991
to develop a way to respond to that "what if" scenario—the loss of
an entire central office.
Here are the few measures taken by the NDRT:
• They roll in COLTs (Cell on light trucks) and provides
emergency sell coverage .
• They also provide charging stations
• The Hazardous Materials team trains technicians on how put
on the proper safety garb to get access in to areas to service
AT&T’s infrastructure.
Public Wifi
Hacking
The Power of PowerPoint - thepopp.com
18
A free Wi-Fi connection in a public space can seem like a lifesaver when you’re on the go. But if
you decide to use it, just be aware that you could be making yourself an easy target for hackers
and putting your information at risk.
Public Wireless Fidelity:
Lets Capture Some Data from public Wi-Fi
Thank you for watching!


Mais conteúdo relacionado

Semelhante a Disaster recovery and WiFi hacking

V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
VMware_EMEA
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
ReadWrite
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
Jason Dea
 
7_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-167_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-16
Peak 10
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep Dive
Liberteks
 
Paul Giralt Without Ch# 6
Paul Giralt Without Ch# 6Paul Giralt Without Ch# 6
Paul Giralt Without Ch# 6
guest6cfa525
 

Semelhante a Disaster recovery and WiFi hacking (20)

V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
 
Disaster Recovery Planning Powerpoint Presentation Slides
Disaster Recovery Planning Powerpoint Presentation SlidesDisaster Recovery Planning Powerpoint Presentation Slides
Disaster Recovery Planning Powerpoint Presentation Slides
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Disaster Recovery - Deep Dive
Disaster Recovery - Deep DiveDisaster Recovery - Deep Dive
Disaster Recovery - Deep Dive
 
7_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-167_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-16
 
Executive Primer on Business Continuity Planning
Executive Primer on Business Continuity PlanningExecutive Primer on Business Continuity Planning
Executive Primer on Business Continuity Planning
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Semicon west monetizing the internet of things
Semicon west   monetizing the internet of thingsSemicon west   monetizing the internet of things
Semicon west monetizing the internet of things
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep Dive
 
RCFA Success of Root Cause Failure Analysis
RCFA Success of Root Cause Failure AnalysisRCFA Success of Root Cause Failure Analysis
RCFA Success of Root Cause Failure Analysis
 
The Nuts and Bolts of Disaster Recovery
The Nuts and Bolts of Disaster RecoveryThe Nuts and Bolts of Disaster Recovery
The Nuts and Bolts of Disaster Recovery
 
What are the risks that may affect the availability of a data center
What are the risks that may affect the availability of a data centerWhat are the risks that may affect the availability of a data center
What are the risks that may affect the availability of a data center
 
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
 
Paul Giralt Without Ch# 6
Paul Giralt Without Ch# 6Paul Giralt Without Ch# 6
Paul Giralt Without Ch# 6
 
IT Disaster Recovery Plan
IT Disaster Recovery PlanIT Disaster Recovery Plan
IT Disaster Recovery Plan
 
Chicago Tribune's Server Consolidation a Success
Chicago Tribune's Server Consolidation a SuccessChicago Tribune's Server Consolidation a Success
Chicago Tribune's Server Consolidation a Success
 

Último

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Disaster recovery and WiFi hacking

  • 1. "In the name of God, the Most Gracious, the Most Merciful"
  • 2. The Power of PowerPoint - thepopp.com 2 Context: 1 Importance Disaster Recovery Plan 2 Cause and effects Disaster & its Types 3 Important part of business Business Continuity Plan example AT&T Network Collapse 5 Practical Public Wi-Fi Data Capture 4
  • 4. Introduction The Disaster Recovery Plan (DRP) captures all of the information that describes organization’s ability to withstand a disaster as well as the processes that must be followed to achieve disaster recovery.
  • 5. The Power of PowerPoint - thepopp.com 5 Disaster Disaster identify an event that includes three elements: • Suddenness • Unexpectedness • Significant destruction and/or adverse consequences A fourth element, lack of foresight or planning, is sometimes added. What is a disaster?
  • 6. The Power of PowerPoint - thepopp.com 6 Types of disaster: Disaster is classified into two main types: Natural disaster: A natural hazard is a natural process or phenomenon that may cause loss of life, injury or other health impacts etc. • Earthquakes • Volcanos Man Made Disaster: The disasters themselves could be unintentional, but, are caused due to some intentional activity. • Chemical Leaks/Spill over • Terrorist Activities
  • 7.
  • 8. Business Continuity Plan The Power of PowerPoint - thepopp.com 8  A business continuity plan (BCP) is a plan to help ensure that business processes can continue during a time of emergency or disaster.  Businesses need to look at all such potential threats and plan BCPs to ensure continued operations should the threat become a reality.  In BCPs you need to establish recovery time objectives (RTOs) and recovery point objectives (RPOs).
  • 9. RTO & RPO RTO stands for recovery time objective, which is the duration of time in which a business must restore normal system recovery to avoid consequences that can not only break business continuity but also cause financial loss. RPO stands for recovery point objective, which is the time that a disruption occurs before the maximum acceptable data loss that can be tolerated is reached. This means data loss to the point where disruption can be caused to the general running of the business.
  • 10. Business Continuity Plan Life Cycle The business continuity life cycle includes components such as Identify, Analyze, Design, and Execute.
  • 11. The Power of PowerPoint - thepopp.com
  • 13. AT&T Network in 1990 The Power of PowerPoint - thepopp.com 13 AT&T's long-distance network was a model of reliability and strength. It carried over 70% of the nation's long- distance traffic, route over 115 million telephone calls. But some thing happen in 1990,At 2:25pm on Monday, January 15th,Within seconds, the giant 72 screen video array that graphically represented the network was crisscrossed with a tangle of red lines as a rapidly spreading malfunction leapfrogged from one computer- operated switching center to another. They try to bring the network back, AT&T alone lost more than $60 million in unconnected calls.
  • 14. The Power of PowerPoint - thepopp.com 14 Reason Behind the Crash The cause of the problem had come months before. In early December, technicians had upgraded the software to speed processing of certain types of messages. Although the upgraded code had been rigorously tested, a one- line bug was inadvertently added to the recovery software of each of the 114 switches in the network. The defect was a C program that featured a break statement located within an if clause, that was nested within a switch clause.
  • 15. The Power of PowerPoint - thepopp.com 15
  • 16. The Power of PowerPoint - thepopp.com 16 Disaster Recovery AT&T's Network Disaster Recovery program was formed in 1991 to develop a way to respond to that "what if" scenario—the loss of an entire central office. Here are the few measures taken by the NDRT: • They roll in COLTs (Cell on light trucks) and provides emergency sell coverage . • They also provide charging stations • The Hazardous Materials team trains technicians on how put on the proper safety garb to get access in to areas to service AT&T’s infrastructure.
  • 18. The Power of PowerPoint - thepopp.com 18 A free Wi-Fi connection in a public space can seem like a lifesaver when you’re on the go. But if you decide to use it, just be aware that you could be making yourself an easy target for hackers and putting your information at risk. Public Wireless Fidelity:
  • 19. Lets Capture Some Data from public Wi-Fi
  • 20. Thank you for watching! 