SlideShare uma empresa Scribd logo
1 de 60
Business Continuity
& Disaster Recovery
Muhammad Adeel Javaid
Imagine a company…
Bank with 1 Million accounts, social
security numbers, credit cards, loans…
Airline serving 50,000 people on 250
flights daily…
Pharmacy system filling 5 million
prescriptions per year, some of the
prescriptions are life-saving…
Factory with 200 employees producing
200,000 products per day using robots…
Imagine a system failure…
 Server failure
 Disk System failure
 Hacker break-in
 Denial of Service attack
 Extended power failure
 Snow storm
 Spyware
 Malevolent virus or worm
 Earthquake, tornado
 Employee error or revenge
How will this affect each
business?
First Step:
Business Impact Analysis
Which business processes are of strategic
importance?
What disasters could occur?
What impact would they have on the
organization financially? Legally? On
human life? On reputation?
What is the required recovery time period?
Answers obtained via questionnaire,
interviews, or meeting with key users of IT
Event Damage Classification
Negligible: No significant cost or damage
Minor: A non-negligible event with no material or
financial impact on the business
Major: Impacts one or more departments and may
impact outside clients
Crisis: Has a major material or financial impact on
the business
Minor, Major, & Crisis events should be
documented and tracked to repair
Workbook:
Disasters and Impact
Problematic Event
or Incident
Affected Business Process(es)
(Assumes a university)
Impact Classification &
Effect on finances, legal
liability, human life,
reputation
Fire Class rooms, business
departments
Crisis, at times Major,
Human life
Hacking Attack Registration, advising, Major,
Legal liability
Network
Unavailable
Registration, advising, classes,
homework, education
Crisis
Social
engineering, /Fraud
Registration, Major,
Legal liability
Server Failure
(Disk/server)
Registration, advising, classes,
homework, education.
Major, at times: Crisis
Recovery Time: Terms
Interruption Window: Time duration organization can wait
between point of failure and service resumption
Service Delivery Objective (SDO): Level of service in Alternate
Mode
Maximum Tolerable Outage: Max time in Alternate Mode
Regular Service
Alternate Mode
Regular
Service
Interruption
Window
Maximum Tolerable Outage
SDO
Interruption
Time…
Disaster
Recovery
Plan Implemented
Restoration
Plan Implemented
Definitions
Business Continuity: Offer critical services in
event of disruption
Disaster Recovery: Survive interruption to
computer information systems
Alternate Process Mode: Service offered by
backup system
Disaster Recovery Plan (DRP): How to transition
to Alternate Process Mode
Restoration Plan: How to return to regular system
mode
Classification of Services
Critical $$$$: Cannot be performed manually.
Tolerance to interruption is very low
Vital $$: Can be performed manually for very short
time
Sensitive $: Can be performed manually for a
period of time, but may cost more in staff
Nonsensitive ¢: Can be performed manually for
an extended period of time with little additional
cost and minimal recovery effort
Determine Criticality of Business
Processes
Corporate
Sales (1) Shipping (2) Engineering (3)
Web Service (1) Sales Calls (2)
Product A (1)
Product B (2)
Product C (3)
Product A (1)
Orders (1)
Inventory (2)
Product B (2)
RPO and RTO
How far back can you fail to? How long can you operate without a system?
One week’s worth of data? Which services can last how long?
Interruption
1 1 1
Hour Day Week
Recovery Point Objective Recovery Time Objective
Interruption
1 1 1
Week Day Hour
Recovery Point Objective
Mirroring:
RAID
Backup
Images
Orphan Data: Data which is lost and never recovered.
RPO influences the Backup Period
Business Impact Analysis
Summary
Service Recovery
Point
Objective
(Hours)
Recovery
Time
Objective
(Hours)
Critical
Resources
(Computer,
people,
peripherals)
Special Notes
(Unusual treatment at
Specific times, unusual risk
conditions)
Registratio
n
0 hours 4 hours SOLAR,
network
Registrar
High priority during Nov-
Jan,
March-June, August.
Personnel 2 hours 8 hours PeopleSoft Can operate manually for
some time
Teaching 1 day 1 hour D2L,
network,
faculty files
During school semester:
high priority.
Work
Book
Partial BIA for a university
RAID – Data Mirroring
ABCDABCD
AB CD Parity
AB CD
RAID 0: Striping RAID 1: Mirroring
Higher Level RAID: Striping & Redundancy
Redundant Array of Independent Disks
Network Disaster Recovery
Redundancy
Includes:
Routing protocols
Fail-over
Multiple paths
Alternative Routing
>1 Medium or
> 1 network provider
Diverse Routing
Multiple paths,
1 medium type
Last-mile circuit protection
E.g., Local: microwave & cable
Long-haul network diversity
Redundant network providers
Voice Recovery
Voice communication backup
Disruption vs. Recovery Costs
Cost
Time
Service Downtime
Alternative Recovery Strategies
Minimum Cost
* Hot Site
* Warm Site
* Cold Site
Alternative Recovery Strategies
Hot Site: Fully configured, ready to operate within hours
Warm Site: Ready to operate within days: no or low power
main computer. Does contain disks, network, peripherals.
Cold Site: Ready to operate within weeks. Contains
electrical wiring, air conditioning, flooring
Duplicate or Redundant Info. Processing Facility:
Standby hot site within the organization
Reciprocal Agreement with another organization or
division
Mobile Site: Fully- or partially-configured trailer comes to
your site, with microwave or satellite communications
What is Cloud Computing?
Database
App Server
Laptop
PC
Web Server
Cloud
Computing
VPN Server
This would cost $200/month.This would cost
$200/month.
Introduction to Cloud
NIST Visual Model of Cloud Computing Definition
National Institute of Standards and Technology, www.cloudstandards.org
Cloud Service Models
Software(SaaS): Provider
runs own applications on
cloud infrastructure.
Platform(PaaS):
Consumer provides apps;
provider provides system
and development
environment.
Infrastructure(laaS):
Provides customers
access to processing,
storage, networks or other
fundamental resources
Cloud Deployment Models
Private Cloud: Dedicated to one organization
Community Cloud: Several organizations with
shared concerns share computer facilities
Public Cloud: Available to the public or a
large industry group
Hybrid Cloud: Two or more clouds (private,
community or public clouds) remain distinct but
are bound together by standardized or
proprietary technology
Major Areas of Security
Concerns
Multi-tenancy: Your app is on same server with other
organizations.
Need: segmentation, isolation, policy
Service Level Agreement (SLA): Defines performance,
security policy, availability, backup, location,
compliance, audit issues
Your Coverage: Total security = your portion + provider
portion
Responsibility varies for IAAS vs. PAAS vs. SAAS
You can transfer security responsibility but not
accountability
Hot Site
 Contractual costs include: basic subscription,
monthly fee, testing charges, activation costs,
and hourly/daily use charges
 Contractual issues include: other subscriber
access, speed of access, configurations, staff
assistance, audit & test
 Hot site is for emergency use – not long term
 May offer warm or cold site for extended
durations
Reciprocal Agreements
Advantage: Low cost
Problems may include:
Quick access
Compatibility (computer, software, …)
Resource availability: computer, network, staff
Priority of visitor
Security (less a problem if same organization)
Testing required
Susceptibility to same disasters
Length of welcomed stay
RPO Controls
Data File and
System/Directory
Location
RPO
(Hours)
Special Treatment
(Backup period, RAID, File
Retention Strategies)
Registration 0 hours RAID.
Mobile Site?
Teaching 1 day Daily backups.
Facilities Computer Center as
Redundant info processing center
Work
Book
Business Continuity Process
 Perform Business Impact Analysis
 Prioritize services to support critical business
processes
 Determine alternate processing modes for
critical and vital services
 Develop the Disaster Recovery plan for IS
systems recovery
 Develop BCP for business operations recovery
and continuation
 Test the plans
 Maintain plans
Question
The amount of data transactions that are
allowed to be lost following a computer
failure (i.e., duration of orphan data) is the:
1.Recovery Time Objective
2.Recovery Point Objective
3.Service Delivery Objective
4.Maximum Tolerable Outage
Question
When the RTO is large, this is associated
with:
1. Critical applications
2. A speedy alternative recovery strategy
3. Sensitive or nonsensitive services
4. An extensive restoration plan
Question
When the RPO is very short, the best
solution is:
1. Cold site
2. Data mirroring
3. A detailed and efficient Disaster
Recovery Plan
4. An accurate Business Continuity Plan
Disaster Recovery
Disaster Recovery
Testing
An Incident Occurs…
Security officer
declares disaster
Call Security
Officer (SO)
or committee
member
SO follows
pre-established
protocol
Emergency Response
Team: Human life:
First concern
Phone tree notifies
relevant participants
IT follows Disaster
Recovery Plan
Public relations
interfaces with media
(everyone else quiet)
Mgmt, legal
council act
Concerns for a BCP/DR Plan
 Evacuation plan: People’s lives always take first
priority
 Disaster declaration: Who, how, for what?
 Responsibility: Who covers necessary disaster
recovery functions
 Procedures for Disaster Recovery
 Procedures for Alternate Mode operation
Resource Allocation: During recovery & continued
operation
Copies of the plan should be off-site
Disaster Recovery
Responsibilities
General Business
 First responder:
Evacuation, fire, health…
 Damage Assessment
 Emergency Mgmt
 Legal Affairs
 Transportation/Relocation
/Coordination (people,
equipment)
 Supplies
 Salvage
 Training
IT-Specific Functions
 Software
 Application
 Emergency operations
 Network recovery
 Hardware
 Database/Data Entry
 Information Security
BCP Documents
Focus: IT Business
Event
Recovery
Disaster Recovery Plan
Procedures to recover at
alternate site
Business Recovery Plan
Recover business after a
disaster
IT Contingency Plan:
Recovers major
application or system
Occupant Emergency Plan:
Protect life and assets during
physical threat
Cyber Incident
Response Plan:
Malicious cyber incident
Crisis Communication Plan:
Provide status reports to public
and personnel
Business
Continuity
Business Continuity Plan
Continuity of Operations Plan
Longer duration outages
Workbook
Business Continuity Overview
Classifica-
tion
(Critical or
Vital)
Business
Process
Incident or
Problematic
Event(s)
Procedure for Handling
(Section 5)
Vital Registration Computer
Failure
If total failure,
forward requests to UW-System
Otherwise, use 1-week-old
database for read purposes only
Critical Teaching Computer
Failure
Faculty DB Recovery Procedure
MTBF = MTTF + MTTR
• Mean Time to Repair (MTTR)
• Mean Time Between Failure (MTBF)
Measure of availability:
• 5 9s = 99.999% of time working = 5 ½
minutes of failure per year.
works repair works repair works
1 day 84 days
Disaster Recovery
Test Execution
Always tested in this order:
Desk-Based Evaluation/Paper Test: A
group steps through a paper procedure and
mentally performs each step.
Preparedness Test: Part of the full test is
performed. Different parts are tested
regularly.
Full Operational Test: Simulation of a full
disaster
Business Continuity Test Types
Checklist Review: Reviews coverage of plan – are all
important concerns covered?
Structured Walkthrough: Reviews all aspects of plan,
often walking through different scenarios
Simulation Test: Execute plan based upon a specific
scenario, without alternate site
Parallel Test: Bring up alternate off-site facility, without
bringing down regular site
Full-Interruption: Move processing from regular site to
alternate site.
Testing Objectives
Main objective: existing plans will result in
successful recovery of infrastructure & business
processes
Also can:
• Identify gaps or errors
• Verify assumptions
• Test time lines
• Train and coordinate staff
Testing Procedures
Tests start simple and
become more challenging
with progress
Include an independent 3rd
party (e.g. auditor) to
observe test
Retain documentation for
audit reviews
Develop test
objectives
Execute Test
Evaluate Test
Develop recommendations
to improve test effectiveness
Follow-Up to ensure
recommendations
implemented
Test Stages
PreTest: Set the Stage
Set up equipment
Prepare staff
Test: Actual test
PostTest: Cleanup
Returning resources
Calculate metrics: Time required, %
success rate in processing, ratio of
successful transactions in Alternate mode
vs. normal mode
Delete test data
Evaluate plan
Implement improvements
PreTest
Test
PostTest
Gap Analysis
Comparing Current Level with Desired Level
• Which processes need to be improved?
• Where is staff or equipment lacking?
• Where does additional coordination need
to occur?
Insurance
IPF &
Equipment
Data & Media Employee
Damage
Business Interruption:
Loss of profit due to IS
interruption
Valuable Papers &
Records: Covers cash
value of lost/damaged
paper & records
Fidelity Coverage:
Loss from dishonest
employees
Extra Expense:
Extra cost of operation
following IPF damage
Media Reconstruction
Cost of reproduction of
media
Errors & Omissions:
Liability for error resulting
in loss to client
IS Equipment &
Facilities: Loss of IPF &
equipment due to
damage
Media Transportation
Loss of data during xport
IPF = Information Processing Facility
Auditing BCP
Includes:
 Is BIA complete with RPO/RTO defined for all services?
 Is the BCP in-line with business goals, effective, and current?
 Is it clear who does what in the BCP and DRP?
 Is everyone trained, competent, and happy with their jobs?
 Is the DRP detailed, maintained, and tested?
 Is the BCP and DRP consistent in their recovery coverage?
 Are people listed in the BCP/phone tree current and do they have a
copy of BC manual?
 Are the backup/recovery procedures being followed?
 Does the hot site have correct copies of all software?
 Is the backup site maintained to expectations, and are the
expectations effective?
 Was the DRP test documented well, and was the DRP updated?
Summary of BC Security
Controls
• RAID
• Backups: Incremental backup, differential
backup
• Networks: Diverse routing, alternative routing
• Alternative Site: Hot site, warm site, cold site,
reciprocal agreement, mobile site
• Testing: checklist, structured walkthrough,
simulation, parallel, full interruption
• Insurance
Question
The FIRST thing that should be done when you discover
an intruder has hacked into your computer system is to:
1. Disconnect the computer facilities from the computer
network to hopefully disconnect the attacker
2. Power down the server to prevent further loss of
confidentiality and data integrity.
3. Call the manager.
4. Follow the directions of the Incident Response Plan.
Question
During an audit of the business continuity
plan, the finding of MOST concern is:
1. The phone tree has not been double-
checked in 6 months
2. The Business Impact Analysis has not
been updated this year
3. A test of the backup-recovery system is
not performed regularly
4. The backup library site lacks a UPS
Question
The first and most important BCP test is the:
1. Fully operational test
2. Preparedness test
3. Security test
4. Desk-based paper test
Question
When a disaster occurs, the highest
priority is:
1.Ensuring everyone is safe
2.Minimizing data loss by saving important
data
3.Recovery of backup tapes
4.Calling a manager
Question
A documented process where one
determines the most crucial IT operations
from the business perspective
1.Business Continuity Plan
2.Disaster Recovery Plan
3.Restoration Plan
4.Business Impact Analysis
Question
The PRIMARY goal of the Post-Test is:
1. Write a report for audit purposes
2. Return to normal processing
3. Evaluate test effectiveness and update
the response plan
4. Report on test to management
Question
A test that verifies that the alternate site
successfully can process transactions is
known as:
1. Structured walkthrough
2. Parallel test
3. Simulation test
4. Preparedness test
Vocabulary
•Business Continuity Plan (BCP), Business Impact Analysis
(BIA), RAID, Disaster Recovery Plan (DRP)
•Hot site, warm site, cold site, reciprocal agreement, mobile site
•Interruption window, Maximum tolerable outage, Service
delivery objective
•Recovery point objective (RPO), Recovery time objective
(RTO)
•Desk based or paper test, preparedness test, fully operational
test,
•Test: checklist, structured walkthrough, simulation test, parallel
test, full interruption, pretest, post-test
•Diverse routing, alternative routing
•Incremental backup, differential backup
•Define cloud computing, Infrastructure as a Service, Platform
as Service, Software as a Service, Private cloud, Community
cloud, Public cloud, Hybrid cloud.
Interactive Crossword Puzzle
To get more practice the vocabulary from
this section click on the picture below. For
a word bank look at the previous slide.
Definitions adapted from:
All-In-One CISA Exam Guide
HEALTH FIRST CASE STUDY
Business Impact Analysis & Business Continuity
Jamie Ramon MD
Doctor
Chris Ramon RD
Dietician
Terry
Licensed
Practicing Nurse
Pat
Software Consultant
Step 1: Define Threats
Resulting in Business Disruption
Key questions:
•Which business processes
are of strategic importance?
•What disasters could
occur?
•What impact would they
have on the organization
financially? Legally? On
human life? On reputation?
Impact Classification
Negligible: No significant
cost or damage
Minor: A non-negligible event
with no material or financial
impact on the business
Major: Impacts one or more
departments and may impact
outside clients
Crisis: Has a major financial
impact on the business
Step 1: Define Threats
Resulting in Business Disruption
Problematic
Event or
Incident
Affected
Business
Process(es)
Impact Classification &
Effect on finances,
legal liability, human
life, reputation
Fire
Hacking incident
Network Unavailable
(E.g., ISP problem)
Social engineering,
fraud
Server Failure (E.g.,
Disk)
Power Failure
1 1 1
Hour Day Week
Step 2: Define Recovery Objectives
Recovery Point Objective Recovery Time Objective
Interruption
Business
Process
Recovery
Time
Objective
(Hours)
Recovery
Point
Objective
(Hours)
Critical
Resources
(Computer,
people,
peripherals)
Special Notes
(Unusual treatment at
specific times, unusual risk
conditions)
1 1 1
Week Day Hour
Business Continuity
Step 3: Attaining Recovery Point Objective
(RPO)
Step 4: Attaining Recovery Time Objective
(RTO)
Classification
(Critical or
Vital)
Business
Process
Problem Event(s)
or Incident
Procedure for Handling
(Section 5)
Criticality Classification
Critical: Cannot be performed manually.
Tolerance to interruption is very low
Vital: Can be performed manually for very short
time
Sensitive: Can be performed manually for a
period of time, but may cost more in staff
Non-sensitive: Can be performed manually for an
extended period of time with little additional cost
and minimal recovery effort

Mais conteúdo relacionado

Mais procurados

Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan Emilie Gray
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Rochester Security Summit
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery PlanningJohn Wilson
 
Disaster recovery solution
Disaster recovery solutionDisaster recovery solution
Disaster recovery solutionAnton An
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoverymadunix
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management systemsubbusai82
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBob Winkler
 
Assessing the impact of a disruption: Building an effective business impact a...
Assessing the impact of a disruption: Building an effective business impact a...Assessing the impact of a disruption: Building an effective business impact a...
Assessing the impact of a disruption: Building an effective business impact a...Bryghtpath LLC
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planningguest340570
 
Business continuity & Disaster recovery planing
Business continuity & Disaster recovery planingBusiness continuity & Disaster recovery planing
Business continuity & Disaster recovery planingHanaysha
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery PlanDavid Donovan
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryEC-Council
 
Cybersecurity Risk Quantification
Cybersecurity Risk QuantificationCybersecurity Risk Quantification
Cybersecurity Risk QuantificationMatthew Karnas
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMLibcorpio
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsPriyanka Aash
 

Mais procurados (20)

Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Disaster recovery solution
Disaster recovery solutionDisaster recovery solution
Disaster recovery solution
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
 
Assessing the impact of a disruption: Building an effective business impact a...
Assessing the impact of a disruption: Building an effective business impact a...Assessing the impact of a disruption: Building an effective business impact a...
Assessing the impact of a disruption: Building an effective business impact a...
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planning
 
Business continuity & Disaster recovery planing
Business continuity & Disaster recovery planingBusiness continuity & Disaster recovery planing
Business continuity & Disaster recovery planing
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
Cybersecurity Risk Quantification
Cybersecurity Risk QuantificationCybersecurity Risk Quantification
Cybersecurity Risk Quantification
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRM
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 

Destaque

Business Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeBusiness Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeDipankar Ghosh
 
Drp Bcp Testing Alternatives
Drp Bcp Testing AlternativesDrp Bcp Testing Alternatives
Drp Bcp Testing AlternativesGewurtz
 
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTContinuity and Resilience
 
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...BCM Institute
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBCContinuity and Resilience
 
Application migration guideline document
Application migration guideline documentApplication migration guideline document
Application migration guideline documentThomas Bronack
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.inSatya Yadav
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
BIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and DependenciesBIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and DependenciesRamiro Cid
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshareChris Greenhill
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanJan Wong
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsCharlton Inao
 
How to manage a service company with Odoo
How to manage a service company with OdooHow to manage a service company with Odoo
How to manage a service company with OdooOdoo
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarITSM Academy, Inc.
 
Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014Arthur Ashidiqy
 

Destaque (20)

Perils of an Old Metric: MTBF
Perils of an Old Metric: MTBFPerils of an Old Metric: MTBF
Perils of an Old Metric: MTBF
 
Business Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeBusiness Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In Practice
 
Drp Bcp Testing Alternatives
Drp Bcp Testing AlternativesDrp Bcp Testing Alternatives
Drp Bcp Testing Alternatives
 
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
 
Business resiliency workshop
Business resiliency workshopBusiness resiliency workshop
Business resiliency workshop
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
 
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBC
 
Application migration guideline document
Application migration guideline documentApplication migration guideline document
Application migration guideline document
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
BIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and DependenciesBIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and Dependencies
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery Plan
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systems
 
How to manage a service company with Odoo
How to manage a service company with OdooHow to manage a service company with Odoo
How to manage a service company with Odoo
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
 
Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014
 

Semelhante a Business continuity and disaster recovery

Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010Nathan Winters
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryMark McHenry
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCSteve Meek
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperChristian Caracciolo
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz ResumptJimGroark
 
Business Meets IT Presentatie
Business Meets IT PresentatieBusiness Meets IT Presentatie
Business Meets IT PresentatieRuud Stroet
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity CapabilityRod Davis
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and StandardPT Datacomm Diangraha
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankactualtechmedia
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideLaura Breese
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxduketjoy27252
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 

Semelhante a Business continuity and disaster recovery (20)

Disaster recovery enw
Disaster recovery enwDisaster recovery enw
Disaster recovery enw
 
Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BC
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz Resumpt
 
Business Meets IT Presentatie
Business Meets IT PresentatieBusiness Meets IT Presentatie
Business Meets IT Presentatie
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bank
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 

Mais de Adeel Javaid

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manualAdeel Javaid
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsAdeel Javaid
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system securityAdeel Javaid
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computingAdeel Javaid
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networksAdeel Javaid
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in AcademiaAdeel Javaid
 
Secrets of success
Secrets of successSecrets of success
Secrets of successAdeel Javaid
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcareAdeel Javaid
 
Share point presentation
Share point presentationShare point presentation
Share point presentationAdeel Javaid
 
Project management
Project managementProject management
Project managementAdeel Javaid
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mindAdeel Javaid
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategyAdeel Javaid
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production systemAdeel Javaid
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturingAdeel Javaid
 

Mais de Adeel Javaid (20)

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
What is ph d
What is ph dWhat is ph d
What is ph d
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
 
Project management
Project managementProject management
Project management
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
 
Channel marketing
Channel marketingChannel marketing
Channel marketing
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
 
Cloud security
Cloud securityCloud security
Cloud security
 

Último

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 

Último (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

Business continuity and disaster recovery

  • 1. Business Continuity & Disaster Recovery Muhammad Adeel Javaid
  • 2. Imagine a company… Bank with 1 Million accounts, social security numbers, credit cards, loans… Airline serving 50,000 people on 250 flights daily… Pharmacy system filling 5 million prescriptions per year, some of the prescriptions are life-saving… Factory with 200 employees producing 200,000 products per day using robots…
  • 3. Imagine a system failure…  Server failure  Disk System failure  Hacker break-in  Denial of Service attack  Extended power failure  Snow storm  Spyware  Malevolent virus or worm  Earthquake, tornado  Employee error or revenge How will this affect each business?
  • 4. First Step: Business Impact Analysis Which business processes are of strategic importance? What disasters could occur? What impact would they have on the organization financially? Legally? On human life? On reputation? What is the required recovery time period? Answers obtained via questionnaire, interviews, or meeting with key users of IT
  • 5. Event Damage Classification Negligible: No significant cost or damage Minor: A non-negligible event with no material or financial impact on the business Major: Impacts one or more departments and may impact outside clients Crisis: Has a major material or financial impact on the business Minor, Major, & Crisis events should be documented and tracked to repair
  • 6. Workbook: Disasters and Impact Problematic Event or Incident Affected Business Process(es) (Assumes a university) Impact Classification & Effect on finances, legal liability, human life, reputation Fire Class rooms, business departments Crisis, at times Major, Human life Hacking Attack Registration, advising, Major, Legal liability Network Unavailable Registration, advising, classes, homework, education Crisis Social engineering, /Fraud Registration, Major, Legal liability Server Failure (Disk/server) Registration, advising, classes, homework, education. Major, at times: Crisis
  • 7. Recovery Time: Terms Interruption Window: Time duration organization can wait between point of failure and service resumption Service Delivery Objective (SDO): Level of service in Alternate Mode Maximum Tolerable Outage: Max time in Alternate Mode Regular Service Alternate Mode Regular Service Interruption Window Maximum Tolerable Outage SDO Interruption Time… Disaster Recovery Plan Implemented Restoration Plan Implemented
  • 8. Definitions Business Continuity: Offer critical services in event of disruption Disaster Recovery: Survive interruption to computer information systems Alternate Process Mode: Service offered by backup system Disaster Recovery Plan (DRP): How to transition to Alternate Process Mode Restoration Plan: How to return to regular system mode
  • 9. Classification of Services Critical $$$$: Cannot be performed manually. Tolerance to interruption is very low Vital $$: Can be performed manually for very short time Sensitive $: Can be performed manually for a period of time, but may cost more in staff Nonsensitive ¢: Can be performed manually for an extended period of time with little additional cost and minimal recovery effort
  • 10. Determine Criticality of Business Processes Corporate Sales (1) Shipping (2) Engineering (3) Web Service (1) Sales Calls (2) Product A (1) Product B (2) Product C (3) Product A (1) Orders (1) Inventory (2) Product B (2)
  • 11. RPO and RTO How far back can you fail to? How long can you operate without a system? One week’s worth of data? Which services can last how long? Interruption 1 1 1 Hour Day Week Recovery Point Objective Recovery Time Objective Interruption 1 1 1 Week Day Hour
  • 12. Recovery Point Objective Mirroring: RAID Backup Images Orphan Data: Data which is lost and never recovered. RPO influences the Backup Period
  • 13. Business Impact Analysis Summary Service Recovery Point Objective (Hours) Recovery Time Objective (Hours) Critical Resources (Computer, people, peripherals) Special Notes (Unusual treatment at Specific times, unusual risk conditions) Registratio n 0 hours 4 hours SOLAR, network Registrar High priority during Nov- Jan, March-June, August. Personnel 2 hours 8 hours PeopleSoft Can operate manually for some time Teaching 1 day 1 hour D2L, network, faculty files During school semester: high priority. Work Book Partial BIA for a university
  • 14. RAID – Data Mirroring ABCDABCD AB CD Parity AB CD RAID 0: Striping RAID 1: Mirroring Higher Level RAID: Striping & Redundancy Redundant Array of Independent Disks
  • 15. Network Disaster Recovery Redundancy Includes: Routing protocols Fail-over Multiple paths Alternative Routing >1 Medium or > 1 network provider Diverse Routing Multiple paths, 1 medium type Last-mile circuit protection E.g., Local: microwave & cable Long-haul network diversity Redundant network providers Voice Recovery Voice communication backup
  • 16. Disruption vs. Recovery Costs Cost Time Service Downtime Alternative Recovery Strategies Minimum Cost * Hot Site * Warm Site * Cold Site
  • 17. Alternative Recovery Strategies Hot Site: Fully configured, ready to operate within hours Warm Site: Ready to operate within days: no or low power main computer. Does contain disks, network, peripherals. Cold Site: Ready to operate within weeks. Contains electrical wiring, air conditioning, flooring Duplicate or Redundant Info. Processing Facility: Standby hot site within the organization Reciprocal Agreement with another organization or division Mobile Site: Fully- or partially-configured trailer comes to your site, with microwave or satellite communications
  • 18. What is Cloud Computing? Database App Server Laptop PC Web Server Cloud Computing VPN Server
  • 19. This would cost $200/month.This would cost $200/month. Introduction to Cloud NIST Visual Model of Cloud Computing Definition National Institute of Standards and Technology, www.cloudstandards.org
  • 20. Cloud Service Models Software(SaaS): Provider runs own applications on cloud infrastructure. Platform(PaaS): Consumer provides apps; provider provides system and development environment. Infrastructure(laaS): Provides customers access to processing, storage, networks or other fundamental resources
  • 21. Cloud Deployment Models Private Cloud: Dedicated to one organization Community Cloud: Several organizations with shared concerns share computer facilities Public Cloud: Available to the public or a large industry group Hybrid Cloud: Two or more clouds (private, community or public clouds) remain distinct but are bound together by standardized or proprietary technology
  • 22. Major Areas of Security Concerns Multi-tenancy: Your app is on same server with other organizations. Need: segmentation, isolation, policy Service Level Agreement (SLA): Defines performance, security policy, availability, backup, location, compliance, audit issues Your Coverage: Total security = your portion + provider portion Responsibility varies for IAAS vs. PAAS vs. SAAS You can transfer security responsibility but not accountability
  • 23. Hot Site  Contractual costs include: basic subscription, monthly fee, testing charges, activation costs, and hourly/daily use charges  Contractual issues include: other subscriber access, speed of access, configurations, staff assistance, audit & test  Hot site is for emergency use – not long term  May offer warm or cold site for extended durations
  • 24. Reciprocal Agreements Advantage: Low cost Problems may include: Quick access Compatibility (computer, software, …) Resource availability: computer, network, staff Priority of visitor Security (less a problem if same organization) Testing required Susceptibility to same disasters Length of welcomed stay
  • 25. RPO Controls Data File and System/Directory Location RPO (Hours) Special Treatment (Backup period, RAID, File Retention Strategies) Registration 0 hours RAID. Mobile Site? Teaching 1 day Daily backups. Facilities Computer Center as Redundant info processing center Work Book
  • 26. Business Continuity Process  Perform Business Impact Analysis  Prioritize services to support critical business processes  Determine alternate processing modes for critical and vital services  Develop the Disaster Recovery plan for IS systems recovery  Develop BCP for business operations recovery and continuation  Test the plans  Maintain plans
  • 27. Question The amount of data transactions that are allowed to be lost following a computer failure (i.e., duration of orphan data) is the: 1.Recovery Time Objective 2.Recovery Point Objective 3.Service Delivery Objective 4.Maximum Tolerable Outage
  • 28. Question When the RTO is large, this is associated with: 1. Critical applications 2. A speedy alternative recovery strategy 3. Sensitive or nonsensitive services 4. An extensive restoration plan
  • 29. Question When the RPO is very short, the best solution is: 1. Cold site 2. Data mirroring 3. A detailed and efficient Disaster Recovery Plan 4. An accurate Business Continuity Plan
  • 31. An Incident Occurs… Security officer declares disaster Call Security Officer (SO) or committee member SO follows pre-established protocol Emergency Response Team: Human life: First concern Phone tree notifies relevant participants IT follows Disaster Recovery Plan Public relations interfaces with media (everyone else quiet) Mgmt, legal council act
  • 32. Concerns for a BCP/DR Plan  Evacuation plan: People’s lives always take first priority  Disaster declaration: Who, how, for what?  Responsibility: Who covers necessary disaster recovery functions  Procedures for Disaster Recovery  Procedures for Alternate Mode operation Resource Allocation: During recovery & continued operation Copies of the plan should be off-site
  • 33. Disaster Recovery Responsibilities General Business  First responder: Evacuation, fire, health…  Damage Assessment  Emergency Mgmt  Legal Affairs  Transportation/Relocation /Coordination (people, equipment)  Supplies  Salvage  Training IT-Specific Functions  Software  Application  Emergency operations  Network recovery  Hardware  Database/Data Entry  Information Security
  • 34. BCP Documents Focus: IT Business Event Recovery Disaster Recovery Plan Procedures to recover at alternate site Business Recovery Plan Recover business after a disaster IT Contingency Plan: Recovers major application or system Occupant Emergency Plan: Protect life and assets during physical threat Cyber Incident Response Plan: Malicious cyber incident Crisis Communication Plan: Provide status reports to public and personnel Business Continuity Business Continuity Plan Continuity of Operations Plan Longer duration outages
  • 35. Workbook Business Continuity Overview Classifica- tion (Critical or Vital) Business Process Incident or Problematic Event(s) Procedure for Handling (Section 5) Vital Registration Computer Failure If total failure, forward requests to UW-System Otherwise, use 1-week-old database for read purposes only Critical Teaching Computer Failure Faculty DB Recovery Procedure
  • 36. MTBF = MTTF + MTTR • Mean Time to Repair (MTTR) • Mean Time Between Failure (MTBF) Measure of availability: • 5 9s = 99.999% of time working = 5 ½ minutes of failure per year. works repair works repair works 1 day 84 days
  • 37. Disaster Recovery Test Execution Always tested in this order: Desk-Based Evaluation/Paper Test: A group steps through a paper procedure and mentally performs each step. Preparedness Test: Part of the full test is performed. Different parts are tested regularly. Full Operational Test: Simulation of a full disaster
  • 38. Business Continuity Test Types Checklist Review: Reviews coverage of plan – are all important concerns covered? Structured Walkthrough: Reviews all aspects of plan, often walking through different scenarios Simulation Test: Execute plan based upon a specific scenario, without alternate site Parallel Test: Bring up alternate off-site facility, without bringing down regular site Full-Interruption: Move processing from regular site to alternate site.
  • 39. Testing Objectives Main objective: existing plans will result in successful recovery of infrastructure & business processes Also can: • Identify gaps or errors • Verify assumptions • Test time lines • Train and coordinate staff
  • 40. Testing Procedures Tests start simple and become more challenging with progress Include an independent 3rd party (e.g. auditor) to observe test Retain documentation for audit reviews Develop test objectives Execute Test Evaluate Test Develop recommendations to improve test effectiveness Follow-Up to ensure recommendations implemented
  • 41. Test Stages PreTest: Set the Stage Set up equipment Prepare staff Test: Actual test PostTest: Cleanup Returning resources Calculate metrics: Time required, % success rate in processing, ratio of successful transactions in Alternate mode vs. normal mode Delete test data Evaluate plan Implement improvements PreTest Test PostTest
  • 42. Gap Analysis Comparing Current Level with Desired Level • Which processes need to be improved? • Where is staff or equipment lacking? • Where does additional coordination need to occur?
  • 43. Insurance IPF & Equipment Data & Media Employee Damage Business Interruption: Loss of profit due to IS interruption Valuable Papers & Records: Covers cash value of lost/damaged paper & records Fidelity Coverage: Loss from dishonest employees Extra Expense: Extra cost of operation following IPF damage Media Reconstruction Cost of reproduction of media Errors & Omissions: Liability for error resulting in loss to client IS Equipment & Facilities: Loss of IPF & equipment due to damage Media Transportation Loss of data during xport IPF = Information Processing Facility
  • 44. Auditing BCP Includes:  Is BIA complete with RPO/RTO defined for all services?  Is the BCP in-line with business goals, effective, and current?  Is it clear who does what in the BCP and DRP?  Is everyone trained, competent, and happy with their jobs?  Is the DRP detailed, maintained, and tested?  Is the BCP and DRP consistent in their recovery coverage?  Are people listed in the BCP/phone tree current and do they have a copy of BC manual?  Are the backup/recovery procedures being followed?  Does the hot site have correct copies of all software?  Is the backup site maintained to expectations, and are the expectations effective?  Was the DRP test documented well, and was the DRP updated?
  • 45. Summary of BC Security Controls • RAID • Backups: Incremental backup, differential backup • Networks: Diverse routing, alternative routing • Alternative Site: Hot site, warm site, cold site, reciprocal agreement, mobile site • Testing: checklist, structured walkthrough, simulation, parallel, full interruption • Insurance
  • 46. Question The FIRST thing that should be done when you discover an intruder has hacked into your computer system is to: 1. Disconnect the computer facilities from the computer network to hopefully disconnect the attacker 2. Power down the server to prevent further loss of confidentiality and data integrity. 3. Call the manager. 4. Follow the directions of the Incident Response Plan.
  • 47. Question During an audit of the business continuity plan, the finding of MOST concern is: 1. The phone tree has not been double- checked in 6 months 2. The Business Impact Analysis has not been updated this year 3. A test of the backup-recovery system is not performed regularly 4. The backup library site lacks a UPS
  • 48. Question The first and most important BCP test is the: 1. Fully operational test 2. Preparedness test 3. Security test 4. Desk-based paper test
  • 49. Question When a disaster occurs, the highest priority is: 1.Ensuring everyone is safe 2.Minimizing data loss by saving important data 3.Recovery of backup tapes 4.Calling a manager
  • 50. Question A documented process where one determines the most crucial IT operations from the business perspective 1.Business Continuity Plan 2.Disaster Recovery Plan 3.Restoration Plan 4.Business Impact Analysis
  • 51. Question The PRIMARY goal of the Post-Test is: 1. Write a report for audit purposes 2. Return to normal processing 3. Evaluate test effectiveness and update the response plan 4. Report on test to management
  • 52. Question A test that verifies that the alternate site successfully can process transactions is known as: 1. Structured walkthrough 2. Parallel test 3. Simulation test 4. Preparedness test
  • 53. Vocabulary •Business Continuity Plan (BCP), Business Impact Analysis (BIA), RAID, Disaster Recovery Plan (DRP) •Hot site, warm site, cold site, reciprocal agreement, mobile site •Interruption window, Maximum tolerable outage, Service delivery objective •Recovery point objective (RPO), Recovery time objective (RTO) •Desk based or paper test, preparedness test, fully operational test, •Test: checklist, structured walkthrough, simulation test, parallel test, full interruption, pretest, post-test •Diverse routing, alternative routing •Incremental backup, differential backup •Define cloud computing, Infrastructure as a Service, Platform as Service, Software as a Service, Private cloud, Community cloud, Public cloud, Hybrid cloud.
  • 54. Interactive Crossword Puzzle To get more practice the vocabulary from this section click on the picture below. For a word bank look at the previous slide. Definitions adapted from: All-In-One CISA Exam Guide
  • 55. HEALTH FIRST CASE STUDY Business Impact Analysis & Business Continuity Jamie Ramon MD Doctor Chris Ramon RD Dietician Terry Licensed Practicing Nurse Pat Software Consultant
  • 56. Step 1: Define Threats Resulting in Business Disruption Key questions: •Which business processes are of strategic importance? •What disasters could occur? •What impact would they have on the organization financially? Legally? On human life? On reputation? Impact Classification Negligible: No significant cost or damage Minor: A non-negligible event with no material or financial impact on the business Major: Impacts one or more departments and may impact outside clients Crisis: Has a major financial impact on the business
  • 57. Step 1: Define Threats Resulting in Business Disruption Problematic Event or Incident Affected Business Process(es) Impact Classification & Effect on finances, legal liability, human life, reputation Fire Hacking incident Network Unavailable (E.g., ISP problem) Social engineering, fraud Server Failure (E.g., Disk) Power Failure
  • 58. 1 1 1 Hour Day Week Step 2: Define Recovery Objectives Recovery Point Objective Recovery Time Objective Interruption Business Process Recovery Time Objective (Hours) Recovery Point Objective (Hours) Critical Resources (Computer, people, peripherals) Special Notes (Unusual treatment at specific times, unusual risk conditions) 1 1 1 Week Day Hour
  • 59. Business Continuity Step 3: Attaining Recovery Point Objective (RPO) Step 4: Attaining Recovery Time Objective (RTO) Classification (Critical or Vital) Business Process Problem Event(s) or Incident Procedure for Handling (Section 5)
  • 60. Criticality Classification Critical: Cannot be performed manually. Tolerance to interruption is very low Vital: Can be performed manually for very short time Sensitive: Can be performed manually for a period of time, but may cost more in staff Non-sensitive: Can be performed manually for an extended period of time with little additional cost and minimal recovery effort

Notas do Editor

  1. This covers most of the CISA Chapter on Business Continuity and Disaster Recovery.
  2. Different companies will react in different ways to problems. A bank may want to bring down a network as fast as possible if an intruder penetrates their network. A pharmacy may want to leave their network up as much as possible but doublecheck integrity – or decide to bring down a partial network.
  3. This shows a lot of vocabulary in pictorial form. The alternate mode is not a full service mode.
  4. It is a good idea to classify business processes. Upper management should do this.
  5. We may decide that the Sales function is most critical (or perhaps not), and so Sales is number 1. If we don’t have sales, we don’t ship. Engineers can work at home on their projects. While their work is critical to backup, if they lose a week, it may mean ½ week lost productivity, resulting in lost salary. Within Sales, the web service is 50% of sales, and cannot be done manually, so it is rated number 1. The Sales calls can be done manually at home or most of our sales people are on the road anyway.
  6. A note here is that sometimes the RTO varies by day of year (scheduling system for a school is most important the week before and first week of school.) Also, management and people involved with a database may disagree, in which case management sees the larger picture, and their opinion is most important. However a risk manager may consider both perspectives.
  7. The interruption (red thing) is far to the right. If we want a short RPO, then RAID or disk mirroring is the best option. Otherwise we may want to save off a disk image. A slower recovery would involve tape.
  8. RAID 1 and above use redundancy, offering survival if a single disk fails.
  9. With redundancy, if one part fails, another part can take over. Diverse Routing means one provider, but multiple routes (or paths). Alternate Routing means multiple network providers, and/or multiple mediums (fiber, cable, radio) Long-haul = Long Distance Last-mile circuit = from office (or home) to service provider (local telco or cable company)
  10. There is a curve showing the cost of having a system down, and another curve showing the cost of bringing an alternative system up quickly. The least cost is the cross-point of these two curves.
  11. Hot, warm, cold, and mobile sites can be rented from special companies. Contracts must be carefully looked over. A duplicate info processing facility can be a computer system in another division of the company.
  12. Definition: Cloud Computing: A shared pool of configurable computing resources (such as Servers, Applications, Databases, Services, Computers) that can be rapidly customized and released with minimal management effort or service provider. Any user within the network is allow access to the shred configurable resource by providing authentication. Once authentication is approved, user is allowed to customize resource. Advantages: Cost Since the cloud provider supplies the organization’s infrastructure, cloud computing becomes an operational cost rather than a capital cost. Also cost is reduced by reducing technical staff and centralizing computing resources Scalability Reduces or eliminates physical space for storing data Reliability Large cloud computing providers have redundant sites for users, which may address business continuity and disaster recovery risk Performance Provider continuous and consistent monitoring Agility Rapidly providing infrastructure resources Disadvantage: Potential for High Risk/Security Concerns Since cloud computing is new technology, there maybe unknown bugs or holes Technical Support is not familiar dealing with arising problems Solutions may take longer to solve Source:  CISM® Review Manual 2012 , © 2011, ISACA. All rights reserved. Used by permission.
  13. Some things to consider: Infrastructure: Creates options if the cloud provider has a service interruption Platform: Availability Confidentiality If a security breach happens, privacy and legal liability Data ownerships Concern around e-discovery Software: Who owns the application Where are the applications locations Source:  CISM® Review Manual 2012 , © 2011, ISACA. All rights reserved. Used by permission. Exhibit 3.15
  14. Some things to consider: Private Cloud: Cloud services with minimum risk May not provide scalability and agility of public cloud services Company wants higher control over the environment Community Cloud: Data may be stored with the data of competitors Company needs more than one organization in the company access to the cloud Public Cloud: Data may be stored in unknown locations and may b easily retrievable Company wants general public/large industry group access to the cloud Hybrid Cloud: Aggregate risk from having different cloud computing development models Data should be classified and labeled to assign correct type Source:  CISM® Review Manual 2012 , © 2011, ISACA. All rights reserved. Used by permission. Exhibit 3.16
  15. Some business processes are more important than other business processes. Sales is more important in the short term than engineering, and possibly more than the factory. That is why business processes are prioritized.
  16. 2
  17. 3---Large RTOs mean the application can run manually with little problem for an extended length of time. This is associated with services classified as sensitive or nonsensitive.
  18. 2---RPO requires recovery of data (gathered in the past) immediately. Therefore, the correct answer is data mirroring (or using redundant disks).
  19. This activity diagram shows that some events can happen in parallel, including all the tasks to the right. In some cases there is a security committee, and anyone on the committee can decide a disaster has occurred. There is also a procedure that includes the criteria for making the declaration in the first place. Once that determination is made, disaster protocols can begin.
  20. People’s lives take FIRST PRIORITY is often a question on a CISA or CISM exam.
  21. Each of these potentially need addressing
  22. Here Event Recovery is how to react or recover from the incident. Business Continuity is how Alternate Processing mode should operate.
  23. Mean time means statistical average.
  24. Start with the simplest tests and proceed to the more complex tests. From: All-in-One CISSP Exam Guide, 4 th Edition, Shon Harris, McGraw Hill, 2008
  25. Testing incident response can start with easier operations and proceed to more complex. Often part of the problem is the long time it takes or the errors which are made, which can be optimized by practice.
  26. When testing IR or DR, there are three stages for the testing.
  27. This is an optional slide for Computer Scientists, but may be useful for MIS or IT majors. It is also necessary information for CISA applicants.
  28. 4
  29. 3---The most critical asset for a company is its data. The backup-restore must be tested to ensure that this critical data is always available.
  30. The Desk-based paper test is the first of the three tests, and is considered to be the most critical to perform.
  31. 1
  32. 4. Business Impact Analysis
  33. 3
  34. 2
  35. MINOR CHANGES TYPED FULL NAME INSTEAD OF ABBREVIATION (MEGAN)
  36. Vocabulary answers with multiple words will include spaces between words. Definitions for crossword puzzle are adapted from CISA ® Certified Information Systems Auditor All-in-One Exam Guide, Peter H Gregory, McGraw-Hill Co., 2010.
  37. There will be more threat ideas in the Workbook
  38. There will be more threat ideas in the Workbook
  39. A note here is that sometimes the RTO varies by day of year (scheduling system for a school is most important the week before and first week of school.) Also, management and people involved with a database may disagree, in which case management sees the larger picture, and their opinion is most important. However a risk manager may consider both perspectives.
  40. The full procedure for handling would be documented in section 5 of the workbook.