Contingency Management in IT. Presentation Outline Components of contingency planning Insurance and backups Actual IT contingencies - Y2K problems - major.

Slides:



Advertisements
Similar presentations
Disaster Recovery The People Dimension. Today’s Agenda Why bother with any Disaster Recovery/Business Continuity Planning? Importance of the People Factor.
Advertisements

Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Security Awareness: Applying Practical Security in Your World
Principles of Incident Response and Disaster Recovery
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Planning for Contingencies
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Saving Your Business from a Data Loss Randy Clark.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Business Crisis and Continuity Management (BCCM) Class Session
Services Tailored Around You® Business Contingency Planning Overview July 2013.
1 Business Continuity. 2 Continuity strategy Business impact Incident response Disaster recovery Business continuity.
Planning for Continuity
Information Security Information Technology and Computing Services Information Technology and Computing Services
Continuity Planning & Disaster Recovery ( BRPASW Workshop)
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
RBTC: Business Continuity 101 July 18, What is Business Continuity? Scenario Part 1 Why is BC important? What types of plans are needed? How do.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
INFORMATION SECURITY PLANNING & IMPLEMENTATION Today’s Reference: Whitman & Mattord, Management of Information Security, 2 nd edition, 2008 Chapter 3.
HBCU National Workshop June 24, 2011 Disaster Recovery Reggie Brinson Assoc. VP/Chief Information Officer Clark Atlanta University.
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
What to do “After” your IT guy gets hit by a truck! April 1, 2005.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
Information Systems Security
Disaster Recovery and Business Continuity Planning.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Backup and Recovery Services ”0” “Zero” Means no administration – SymQuest On-Premise Support Services offer Monitored backup jobs Remediation.
SECURITY CONSULTING /DISASTER RECOVERY SERVICE The “Must Have Plans” for a Business in the World of Tomorrow.
Chapter 2 Securing Network Server and User Workstations.
TIJARA Provincial Economic Growth Program Business Continuity / Disaster Recovery Planning Introduction and Workshop Outline Prepared by Larry SanBoeuf.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Crisis Management Crisis: any situation that has the potential to affect long-term confidence in an organisation or product and may interfere with its.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
10/11/20071 Business Continuity and Disaster Recovery Planning CMPE296T Fall 2007 Final Project Professor Richard Sinn Team Members Li Yang Smita Uniyal.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
Uncommon Disasters Require both offsite backup and DR plan  Theft  Fire  Flood  Earthquake  Tornado  Terrorist Attack Examples: Katrina, Southern.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Computer Security Sample security policy Dr Alexei Vernitski.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Disaster Response Management By: Michael Blasic COSC 481.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Developing a Network Security Policy By: Chris Catalano.
Technology and Business Continuity
It’s all about the dpisd dr plan
Disaster Recovery at UNC
MANUFACTURING DISASTER RECOVERY PLAN
Presentation transcript:

Contingency Management in IT

Presentation Outline Components of contingency planning Insurance and backups Actual IT contingencies - Y2K problems - major viruses/worms

Three Main Components of Contingency Planning Incident Response Disaster Recovery Business Continuity

Incident Response (IR) a detailed set of instructions used to plan and anticipate for an event that could harm assets only covers minimal disasters act on the incident - report a possible incident - classify the incident - contain - document

Disaster Recovery (DR) instructions to plan for major incidents (disasters) could be natural (fire, flood, wind, etc..) or manmade (viruses, system misuse) act on the disaster - notify all employees that may be infected - set roles and responsibilities to key personnel - setup alternative business processes (backups) - document all steps in detail bring business back up and running (rebuild structures, implement backups from offsite locations, etc…)

Business Continuity (BC) steps a business must take in order to get it back up and running properly not typically monitored by the IT department setup hot, warm, or cold sites for temporary business functions usually only works directly with the DR team since minor incidents don’t require the business to be reconstructed or setup again

Insurance and Backups be sure your company has an insurance policy to cover lost assets (both informational and physical) backup all information to onsite and offsite locations in case of a major disaster base you insurance policies on location…avoid bankruptcy

Planning for Contingencies: Y2K one of the biggest scares in the information world, specifically banking, electrical and computing, was Y2K scare came about because of date strings being processed in different ways from and the changing of 2 digit dates to 4 digit dates almost all major companies that used computer systems had to develop a contingency plan for Y2K although event never happened, most businesses had a plan in effect and were ready to react

Planning for Contingencies: Worms MyDoom - replicated through attachments - disables antivirus systems from removing it NetSky - passed through attachments - made computer “beep” at random times Klez - passed through as fake attachments from Microsoft Blaster - replicated throughout networks - forced computer to reboot because of Remote Procedure Call errors

Conclusion without planning for contingencies a business would never survive following the main components of contingency planning is key for successful restarts if a disaster does occur be sure to have insurance and backup policies in place

Whitman, M., & Mattord, H. (2004). Management of Information Security. Canada: Thomson Learning, Inc. pp Morrison, Malcolm. (2000). Beyond Y2K: It’s Not Over Till It’s Over. Nursing Homes: Long Term Care Management, Vol. 49, Issue 1. Marino, Gene. (2003). Contingency Planning Essentials. Industrial Engineer: IE, Vol. 35, Issue 7. Disaster. Merriam-Webster’s Online Dictionary. (2006).. References