Systems Availability and Business Continuity.ppt
《Systems Availability and Business Continuity.ppt》由会员分享,可在线阅读,更多相关《Systems Availability and Business Continuity.ppt(26页珍藏版)》请在麦多课文档分享上搜索。
1、Systems Availability and Business Continuity,Chapter FourPrepared by: Raval, Fichadia,Raval Fichadia John Wiley & Sons, Inc. 2007,Chapter Four Objectives,Understand system availability and business continuity, and recognize differences between the two.Comprehend incident response systems and their r
2、ole in achieving the system availability objective.Explain disaster recovery planning objectives and its, design, implementation and testing requirements.Comprehend the link between business continuity and disaster recovery.Understand the role of backup and recovery in disaster recovery plans.,Power
3、 outage at Northwest Airlines,Thunderstorm and lightening at the datacenter location caused the problem. Systems, down initially, operated in a degraded manner the next morning. Took very long to check people in flights. NWA triggered manual processes. Lines became longer and so did the delays in de
4、parture. Arrivals were late, but the departures from gates at the destination airport made the flights to wait before they could get to the gate. NWA announced an embargo, limiting itself to what it can handle under the circumstances.,System Availability and Business Continuity,System availability a
5、ssures you that business will continue to operate. Business continuity is necessary for systems to add value on an ongoing basis. The issues of business continuity and systems availability are related and even overlap to a degree.,Incident Response,Incident: A level of interruption in the system ava
6、ilability that appears to be temporary. An incident can be triggered by an accidental action by an authorized user, it may result from a threat. Incidents may be detected by: End-users who may describe the symptom but not the cause. Those monitoring systems and processes may detect anomalies which l
7、ead to an incident that has occurred. Attack: A series of steps taken by an attacker to achieve an unauthorized result. Event: An action directed at a target that is intended to result in a change of state, or status, of the target. An event consists of an action and a target.,Nature of Response to
8、an Incident,Assess the business significance of the incidents impact. Identify critical business processes that might have been compromised. Determine the root causes of the incident. This might present a challenge, for every incident could be of a different variety. The team may need to consult exp
9、erts from outside the team. Training in forensics could help the team collect and evaluate evidence systematically. Standard procedures must be followed for restoring the affected systems and processes, instead of ad hoc, one-off attempts to restore what is compromised or lost.,Preventive Measures,P
10、revention is better and could be more cost effective - than a cure. Preventive measures require an anticipation or prediction of what might happen in terms of incidents and consequent compromises. Lessons learned from the organizations and from others experiences can help design and implement effect
11、ive preventive measures.,Incident Response Team,A multi-skilled group, since the incident may be any variety and may impact almost any information asset. May include representation from human resources, legal, information systems, networks and communications, physical security, information security,
12、 and public relations. A top management team member may be designated as a direct contact for counseling and support.,CERT,CERT stands for Computer Emergency Readiness Team. Also called CERT Coordination Center (CERT CC), it is the Internets official emergency team. Provides alerts and offers incide
13、nt handling and avoidance guidelines. Is located at Carnegie-Mellon University. www.cert.org,Disaster Recovery,Disaster: An event that causes a significant and perhaps prolonged disruption in system availability. Disasters can be man-made or natural. Man-made disasters can be malicious or unintentio
14、nal. Disaster recovery is a systematic effort to recover from the impact of a disaster. Best way to understand recovery is by focusing on post-disaster phases. Post-disaster phases Immediate response Near-term resumption Recovery toward normalization Restoration to pre-disaster state,Timeliness of A
15、ction and Value of Recovery,Timeliness of action The timeline of actions planned should reflect value of the action at the time. Certain steps can wait while others must be taken without delay, to minimize losses. Value of recovery Timeliness of action reflects value of the recovery target. Consider
16、ing this, recovery tasks should be systematically assigned to each post-disaster phase.,Disaster Recovery Planning (DRP),DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation of strategies for reducing the likelihood of interruption
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SYSTEMSAVAILABILITYANDBUSINESSCONTINUITYPPT
