SlideShare uma empresa Scribd logo
1 de 14
By Tareq Hanaysha , MISSM Candidate
ISSM 511 -Introduction to Information Systems Security
Concordia University College Of Alberta
2/18/2015DR & BCP 1
2/18/2015DR & BCP 2
1. Introduction & Definition of DR and BCP
2.Diefferences and purposes
3.DR & BCP Objectives
4. Major Component of DR & BCP
5. Best Practices
6.Refrences
6.Conclusion
2/18/2015DR & BCP 3
Planning for the worst while hoping that it won’t happen is
something that all security professionals do, disaster recovery
for business continuity has always been a key part for the job .
disaster: is any event that has a
significant impact on an
enterprise's ability to conduct
normal business like
earthquakes, extreme weather,
other natural disasters,
pandemics and terrorism.
Disaster Recovery Plan: Includes
the information and procedures
needed to resume an organization's
operation after some sort of disaster.
Sometimes the plan is split into
several plans, one to address
recoverable disasters (e.g., loss of a
server) and a more comprehensive
business continuity plan for use in
total loss situations.
SIMILAR TERMS: Contingency Plan,
Business Resumption Plan, Continuity
Plan
2/18/2015DR & BCP 4
Business Continuity :is the
enterprise-wide proactive
business process by which we
manage the risks we operate
within.
It addresses all aspects of the
business: People, Processes,
Resources and Technology
(PPRT)
The goal is: preventing or
mitigating the risks we can and
preparing for recovery from
those we cannot, or choose not
to prevent.
Business continuity plans: are
designed to help organisations
protect themselves from the
losses to infrastructure and
resources caused by natural
disasters, pandemics and
terrorism.
Preparation is the key: You fight
like you train!
SIMILAR TERMS: Contingency
Planning, Business Resumption
Planning, Corporate
Contingency Planning, Business
Interruption Planning, Disaster
Preparedness.
2/18/2015DR & BCP 5
Plan Purpose Scope
Business Continuity Plan
(BCP)
Provide procedures for
sustaining essential
business operations
while recovering from a
significant disruption
Addresses business
processes; IT addressed
based only on its support
for business process
Disaster Recovery Plan
(DRP)
Provide detailed
procedures to facilitate
recovery of capabilities
at an alternate site
Often IT-focused; limited
to major disruptions with
long-term effects
2/18/2015DR & BCP 6
1. Limit severity of the event and the magnitude of loss
2. Minimize extent of the interruption
3. Identify critical resources
4. Identify critical functions
5. Define a process to protect critical resources
6. Define alternatives for continuing critical functions
7. Minimize decision making during a crisis
8. Train personnel
9. Continual review and maintenance
10. Integration of Business Continuity with Enterprise Strategic Planning
2/18/2015DR & BCP 7
Disaster recovery
planning
components :
1. Establishment of the
Recovery Team(s)
2. Development of
Recovery Procedures
3. Training of the
Recovery Team(s)
4. Change Management
to keep plan current
5. Provision of
Necessary Resources
(Beans, Bombs and
Bubbas…)
6. Arrangement for
alternate technology
platform, and retrieval
of backup data
2/18/2015DR & BCP 8
Business
Continuity Plan
Component
1. Establishment of
Cross-Functional
Team(s)
2. Inventory of
People, Processes,
Resources and
Technology (PPRT)
3. Risk/Threat
Identification and
Categorization
4. Impact Analysis
and Loss Estimation
5. Prevention,
Mitigation and
Recovery
Strategizing
6. Gap Analysis
and Resolution
Planning
2/18/2015DR & BCP 9
Plan Scope and Support
Senior Management Support (tone at the top)
Defined objectives, policies, scope and success factors and requirements
Standard terms and assumptions
Project plan and budget
Risk Analysis
Risks – Quantitative and Qualitative
Threats – Natural and Man Made
Vulnerabilities – Possibilities of threats occurring have been taken into account
Figure 2-1 Contingency Planning as an Element of Risk Management Implementation
2/18/2015DR & BCP 10
Business Impact Analysis
Time criticality
RTO & RPO
Critical Business Units/Functions
Results based on established quantitative and qualitative metrics
Recovery Strategies
Reasonable strategies identified
Advantages and Disadvantages
Cost vs. Benefit
Business unit buy-in
The BCP Plan
Scope and Objective
Business Recovery Organization
Escalation, Notification, Activation
Resumption, Recovery, Restoration
Maintenance, Testing
2/18/2015DR & BCP 11
Plan Maintenance
Defined timetables
Version control
Changes
Plan Testing
Periodic and methodical
Address major components
Goals objectives for each test
Monitor, analyze, report
Training and Awareness
Plan existence
Responsibilities
Various training methods
2/18/2015DR & BCP 12
Thinking systematically about risk, mitigating risks, and proactively
planning an optimized BCM program is something every company, large
or small, can and should do.
2/18/2015DR & BCP 13
NIST: National Institute of Standards and Technology.
Many Sample DRPs can be seen at www.drj.com.
Planning, a chapter of the book Disaster Recovery Planning: Preparing For The
Unthinkable by Jon Toigo.
www.disasterrecoveryworld.com is a commercial site that also provides excellent
resources, and explains the COBRA method of analysis.
www.crisis-management-and-disaster-recovery.com
Business continuity planning / management (BCM) from wikipedia.org
2/18/2015DR & BCP 14

Mais conteúdo relacionado

Mais procurados

Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoveryKrutiShah114
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesSlideTeam
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoverymadunix
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planninggcleary
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningBharath Rao
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR planDatabarracks
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanMarcelo Silva
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryEC-Council
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management systemsubbusai82
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationPECB
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementRamiro Cid
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningDipankar Ghosh
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.inSatya Yadav
 
BUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemBUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemKuroba Kaitou
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 

Mais procurados (20)

Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business Continuity
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR plan
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity Management
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
 
BUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemBUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT system
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 

Destaque

An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningNEBizRecovery
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoverySirius
 
Business Continuity Plan
Business Continuity PlanBusiness Continuity Plan
Business Continuity PlanPlash Chowdhary
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshareChris Greenhill
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingAxcient
 
ISO 22301: The New Standard for Business Continuity Best Practice
ISO 22301: The New Standard for Business Continuity Best PracticeISO 22301: The New Standard for Business Continuity Best Practice
ISO 22301: The New Standard for Business Continuity Best PracticeMissionMode
 
Lean IT, Lean Business: A new perspective to IT cost optimization
Lean IT, Lean Business: A new perspective to IT cost optimization Lean IT, Lean Business: A new perspective to IT cost optimization
Lean IT, Lean Business: A new perspective to IT cost optimization Imad Almurib
 
BDO Global Risk Landscape
BDO Global Risk LandscapeBDO Global Risk Landscape
BDO Global Risk LandscapeBDO Spain
 
How to Start a Cold Storage Business Project, Excellent opportunity for inves...
How to Start a Cold Storage Business Project, Excellent opportunity for inves...How to Start a Cold Storage Business Project, Excellent opportunity for inves...
How to Start a Cold Storage Business Project, Excellent opportunity for inves...Ajjay Kumar Gupta
 
Devolución de cotizaciones a la Seguridad Social para Autónomos
Devolución de cotizaciones a la Seguridad Social para AutónomosDevolución de cotizaciones a la Seguridad Social para Autónomos
Devolución de cotizaciones a la Seguridad Social para AutónomosBDO Spain
 
Latin CACS 341 Mario Ureña - Sistemas de Gestión Integral
Latin CACS 341   Mario Ureña - Sistemas de Gestión IntegralLatin CACS 341   Mario Ureña - Sistemas de Gestión Integral
Latin CACS 341 Mario Ureña - Sistemas de Gestión IntegralMario Ureña
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementDiane Christina
 

Destaque (19)

An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery Planning
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster Recovery
 
Business Continuity Plan
Business Continuity PlanBusiness Continuity Plan
Business Continuity Plan
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
ISO 22301: The New Standard for Business Continuity Best Practice
ISO 22301: The New Standard for Business Continuity Best PracticeISO 22301: The New Standard for Business Continuity Best Practice
ISO 22301: The New Standard for Business Continuity Best Practice
 
Lean IT, Lean Business: A new perspective to IT cost optimization
Lean IT, Lean Business: A new perspective to IT cost optimization Lean IT, Lean Business: A new perspective to IT cost optimization
Lean IT, Lean Business: A new perspective to IT cost optimization
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
BDO Global Risk Landscape
BDO Global Risk LandscapeBDO Global Risk Landscape
BDO Global Risk Landscape
 
How to Start a Cold Storage Business Project, Excellent opportunity for inves...
How to Start a Cold Storage Business Project, Excellent opportunity for inves...How to Start a Cold Storage Business Project, Excellent opportunity for inves...
How to Start a Cold Storage Business Project, Excellent opportunity for inves...
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Devolución de cotizaciones a la Seguridad Social para Autónomos
Devolución de cotizaciones a la Seguridad Social para AutónomosDevolución de cotizaciones a la Seguridad Social para Autónomos
Devolución de cotizaciones a la Seguridad Social para Autónomos
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Latin CACS 341 Mario Ureña - Sistemas de Gestión Integral
Latin CACS 341   Mario Ureña - Sistemas de Gestión IntegralLatin CACS 341   Mario Ureña - Sistemas de Gestión Integral
Latin CACS 341 Mario Ureña - Sistemas de Gestión Integral
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
TRIO BC/DR
TRIO BC/DRTRIO BC/DR
TRIO BC/DR
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 

Semelhante a Business continuity & Disaster recovery planing

Business continuity & disaster recovery
Business continuity & disaster recoveryBusiness continuity & disaster recovery
Business continuity & disaster recoveryGeorge Coutsoumbidis
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseDesmond Devendran
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseDesmond Devendran
 
Buisness contingency plan
Buisness contingency planBuisness contingency plan
Buisness contingency planRMC
 
A Proactive Approach to Business Continuity
A Proactive Approach to Business ContinuityA Proactive Approach to Business Continuity
A Proactive Approach to Business ContinuityDiana DePaola
 
Business Continuity Plan
Business Continuity PlanBusiness Continuity Plan
Business Continuity PlanBizPlanss
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxjuliennehar
 
Key Features of Effective Business Continuity Plan
Key Features of Effective Business Continuity PlanKey Features of Effective Business Continuity Plan
Key Features of Effective Business Continuity PlanContinuSys
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment planSafwan Hashmi
 
Business Continuity Detailed Plan
Business Continuity Detailed PlanBusiness Continuity Detailed Plan
Business Continuity Detailed PlanWissam Abdel Baki
 
Business continuity in small business 1
Business continuity in small business 1Business continuity in small business 1
Business continuity in small business 1John Johari
 
COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types LynellBull52
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxJayLloyd8
 
A laypersons guide to business continuity management richard (2)
A laypersons guide to business continuity management richard (2)A laypersons guide to business continuity management richard (2)
A laypersons guide to business continuity management richard (2)leemond25
 
Disaster recovery white_paper
Disaster recovery white_paperDisaster recovery white_paper
Disaster recovery white_paperCMR WORLD TECH
 
Business continuity plan
Business continuity planBusiness continuity plan
Business continuity planSafwan Hashmi
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityGeoff Rodrigues
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityGeoff Rodrigues
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014Joel Gomes
 

Semelhante a Business continuity & Disaster recovery planing (20)

Business continuity & disaster recovery
Business continuity & disaster recoveryBusiness continuity & disaster recovery
Business continuity & disaster recovery
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review Course
 
Buisness contingency plan
Buisness contingency planBuisness contingency plan
Buisness contingency plan
 
A Proactive Approach to Business Continuity
A Proactive Approach to Business ContinuityA Proactive Approach to Business Continuity
A Proactive Approach to Business Continuity
 
Business Continuity Plan
Business Continuity PlanBusiness Continuity Plan
Business Continuity Plan
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
 
Key Features of Effective Business Continuity Plan
Key Features of Effective Business Continuity PlanKey Features of Effective Business Continuity Plan
Key Features of Effective Business Continuity Plan
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment plan
 
Business Continuity Detailed Plan
Business Continuity Detailed PlanBusiness Continuity Detailed Plan
Business Continuity Detailed Plan
 
Business continuity in small business 1
Business continuity in small business 1Business continuity in small business 1
Business continuity in small business 1
 
COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
 
A laypersons guide to business continuity management richard (2)
A laypersons guide to business continuity management richard (2)A laypersons guide to business continuity management richard (2)
A laypersons guide to business continuity management richard (2)
 
Disaster recovery white_paper
Disaster recovery white_paperDisaster recovery white_paper
Disaster recovery white_paper
 
Business continuity plan
Business continuity planBusiness continuity plan
Business continuity plan
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic Priority
 
Integrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic PriorityIntegrating Resiliency As A Strategic Priority
Integrating Resiliency As A Strategic Priority
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014
 

Mais de Hanaysha

Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaHanaysha
 
Nessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq HanayshaNessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq HanayshaHanaysha
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaHanaysha
 
GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...
GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...
GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...Hanaysha
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaHanaysha
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaHanaysha
 
Vulnerability scanning report by Tareq Hanaysha
Vulnerability scanning  report by Tareq HanayshaVulnerability scanning  report by Tareq Hanaysha
Vulnerability scanning report by Tareq HanayshaHanaysha
 
Group report for IRAM - Tareq Hanaysha
Group report for IRAM - Tareq HanayshaGroup report for IRAM - Tareq Hanaysha
Group report for IRAM - Tareq HanayshaHanaysha
 
Disaster Recovery with Acronis true image
Disaster Recovery with Acronis true imageDisaster Recovery with Acronis true image
Disaster Recovery with Acronis true imageHanaysha
 
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaVPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaHanaysha
 

Mais de Hanaysha (11)

Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq Hanaysha
 
Nessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq HanayshaNessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq Hanaysha
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
 
GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...
GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...
GOVERNMENT OF AB ACTS ON PRIVACY COMPLIANCE FOR (PIPA) & (FOIP) INSTITUTION -...
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq Hanaysha
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
Vulnerability scanning report by Tareq Hanaysha
Vulnerability scanning  report by Tareq HanayshaVulnerability scanning  report by Tareq Hanaysha
Vulnerability scanning report by Tareq Hanaysha
 
Group report for IRAM - Tareq Hanaysha
Group report for IRAM - Tareq HanayshaGroup report for IRAM - Tareq Hanaysha
Group report for IRAM - Tareq Hanaysha
 
Disaster Recovery with Acronis true image
Disaster Recovery with Acronis true imageDisaster Recovery with Acronis true image
Disaster Recovery with Acronis true image
 
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaVPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Business continuity & Disaster recovery planing

  • 1. By Tareq Hanaysha , MISSM Candidate ISSM 511 -Introduction to Information Systems Security Concordia University College Of Alberta 2/18/2015DR & BCP 1
  • 2. 2/18/2015DR & BCP 2 1. Introduction & Definition of DR and BCP 2.Diefferences and purposes 3.DR & BCP Objectives 4. Major Component of DR & BCP 5. Best Practices 6.Refrences 6.Conclusion
  • 3. 2/18/2015DR & BCP 3 Planning for the worst while hoping that it won’t happen is something that all security professionals do, disaster recovery for business continuity has always been a key part for the job . disaster: is any event that has a significant impact on an enterprise's ability to conduct normal business like earthquakes, extreme weather, other natural disasters, pandemics and terrorism. Disaster Recovery Plan: Includes the information and procedures needed to resume an organization's operation after some sort of disaster. Sometimes the plan is split into several plans, one to address recoverable disasters (e.g., loss of a server) and a more comprehensive business continuity plan for use in total loss situations. SIMILAR TERMS: Contingency Plan, Business Resumption Plan, Continuity Plan
  • 4. 2/18/2015DR & BCP 4 Business Continuity :is the enterprise-wide proactive business process by which we manage the risks we operate within. It addresses all aspects of the business: People, Processes, Resources and Technology (PPRT) The goal is: preventing or mitigating the risks we can and preparing for recovery from those we cannot, or choose not to prevent. Business continuity plans: are designed to help organisations protect themselves from the losses to infrastructure and resources caused by natural disasters, pandemics and terrorism. Preparation is the key: You fight like you train! SIMILAR TERMS: Contingency Planning, Business Resumption Planning, Corporate Contingency Planning, Business Interruption Planning, Disaster Preparedness.
  • 5. 2/18/2015DR & BCP 5 Plan Purpose Scope Business Continuity Plan (BCP) Provide procedures for sustaining essential business operations while recovering from a significant disruption Addresses business processes; IT addressed based only on its support for business process Disaster Recovery Plan (DRP) Provide detailed procedures to facilitate recovery of capabilities at an alternate site Often IT-focused; limited to major disruptions with long-term effects
  • 6. 2/18/2015DR & BCP 6 1. Limit severity of the event and the magnitude of loss 2. Minimize extent of the interruption 3. Identify critical resources 4. Identify critical functions 5. Define a process to protect critical resources 6. Define alternatives for continuing critical functions 7. Minimize decision making during a crisis 8. Train personnel 9. Continual review and maintenance 10. Integration of Business Continuity with Enterprise Strategic Planning
  • 7. 2/18/2015DR & BCP 7 Disaster recovery planning components : 1. Establishment of the Recovery Team(s) 2. Development of Recovery Procedures 3. Training of the Recovery Team(s) 4. Change Management to keep plan current 5. Provision of Necessary Resources (Beans, Bombs and Bubbas…) 6. Arrangement for alternate technology platform, and retrieval of backup data
  • 8. 2/18/2015DR & BCP 8 Business Continuity Plan Component 1. Establishment of Cross-Functional Team(s) 2. Inventory of People, Processes, Resources and Technology (PPRT) 3. Risk/Threat Identification and Categorization 4. Impact Analysis and Loss Estimation 5. Prevention, Mitigation and Recovery Strategizing 6. Gap Analysis and Resolution Planning
  • 9. 2/18/2015DR & BCP 9 Plan Scope and Support Senior Management Support (tone at the top) Defined objectives, policies, scope and success factors and requirements Standard terms and assumptions Project plan and budget Risk Analysis Risks – Quantitative and Qualitative Threats – Natural and Man Made Vulnerabilities – Possibilities of threats occurring have been taken into account Figure 2-1 Contingency Planning as an Element of Risk Management Implementation
  • 10. 2/18/2015DR & BCP 10 Business Impact Analysis Time criticality RTO & RPO Critical Business Units/Functions Results based on established quantitative and qualitative metrics Recovery Strategies Reasonable strategies identified Advantages and Disadvantages Cost vs. Benefit Business unit buy-in The BCP Plan Scope and Objective Business Recovery Organization Escalation, Notification, Activation Resumption, Recovery, Restoration Maintenance, Testing
  • 11. 2/18/2015DR & BCP 11 Plan Maintenance Defined timetables Version control Changes Plan Testing Periodic and methodical Address major components Goals objectives for each test Monitor, analyze, report Training and Awareness Plan existence Responsibilities Various training methods
  • 12. 2/18/2015DR & BCP 12 Thinking systematically about risk, mitigating risks, and proactively planning an optimized BCM program is something every company, large or small, can and should do.
  • 13. 2/18/2015DR & BCP 13 NIST: National Institute of Standards and Technology. Many Sample DRPs can be seen at www.drj.com. Planning, a chapter of the book Disaster Recovery Planning: Preparing For The Unthinkable by Jon Toigo. www.disasterrecoveryworld.com is a commercial site that also provides excellent resources, and explains the COBRA method of analysis. www.crisis-management-and-disaster-recovery.com Business continuity planning / management (BCM) from wikipedia.org