Disaster Recovery Mechanics Adolphe Ngabo COSC 356.

Slides:



Advertisements
Similar presentations
Louisiana Office of Workers Compensation Disaster Recovery.
Advertisements

Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Information Technology Disaster Recovery Awareness Program.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Day Wipe, Recover, Replace, Archives Remote fallback wipe, recover, replace 1.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Remote On-line Backup Service. How safe is your business data?
Our Technology Comes with People Disaster Recovery Planning Glenn Lytle, Vice President Sales, Lumos Networks July 28,
1 An Overview of Computer Security computer security.
Disaster Prevention and Recovery. Team Members   Gwenn Cooper   Kristy Short   John knieling   Carissa Vancleave   Matthew Owens.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Overview of Computer Forensics Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Disaster Recovery Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Mohammed Alqahtani. What is the disaster?  A disaster is An event suddenly and unpredictably happened and caused huge damage, loss or destruction in.
Company Program. Disaster Recovery A Disaster Recovery Plan is a plan for business continuity in the event of a disaster that destroys part or all of.
The Office Procedures and Technology Chapter 9 Records Management Systems Copyright© 2007 Thomson/South-Western.
Company Overview DATASTOR in Education By: Mike Ehring.
Continuity Planning & Disaster Recovery ( BRPASW Workshop)
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Computer Applications Unit D Remote Desktop, Cloud Storage, Dropbox.
Dr.Backup Online Backup Service (888) (toll free)
HBCU National Workshop June 24, 2011 Disaster Recovery Reggie Brinson Assoc. VP/Chief Information Officer Clark Atlanta University.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Continuity of Operations Planning (COOP) for Community Colleges Welcome Introductions Administration Agenda Classroom Decorum Participant-Instructor.
A Document Management Solution Joe Axne IT-GURU LLC
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.
Management Plan Goran Smajlagic S English 2100.
How organizations deal with recovering after a disaster Article: Recovering from Database Recovery: Case Studies and the Lessons They Teach Group 12 Connar.
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
TIJARA Provincial Economic Growth Program Business Continuity / Disaster Recovery Planning Introduction and Workshop Outline Prepared by Larry SanBoeuf.
Introduction to Information Security
Disaster Recovery 2015 Indiana Statewide Payroll Conference Michael Ievoli-Client Support Specialist IV, Major Accounts September 16, 2015 Copyright ©
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Recovery from the earthquake Takashi Sasaki. Disaster recovery “Disaster” comes from human error or hardware failure was considered before We were preparing.
Information Security Crisis Management Daryl Goodwin.
Disaster Response Management By: Michael Blasic COSC 481.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Cloud Storage Market Share,
Alicia A. Coon COSC 480 October 27, 2006
Planning for Application Recovery
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
CompTIA Security+ Study Guide (SY0-401)
MANAGING SECURITY, DISASTER RECOVERY, AND DATA RETENTION
It’s all about the dpisd dr plan
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Disaster Recovery Policy & Procedures
Computer Virus and Antivirus
Bringing Undo to system admin: a new paradigm for recovery
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Decisions Delivers an Easy Way to Plan, Organize and Run Efficient Board and Leadership Meetings Along with the Security of Microsoft Office 365 OFFICE.
Quickly Resolve Your QuickBooks Password Issue
Cloud Storage Services
Virus Attack Final Presentation
CompTIA Security+ Study Guide (SY0-501)
Backing Up Files File Maintenance Unit.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Disaster recovery.
Business Continuity Program Overview
Presentation transcript:

Disaster Recovery Mechanics Adolphe Ngabo COSC 356

Overview What is Disaster Recovery? Levels of Disasters Disaster Recovery Importance Who Uses it? Implementation Conclusion

What is Disaster Recovery? Definition: Disaster recovery is known as a plan for duplicating computer operations after a catastrophe occurs, such as a fire or earthquake. Includes Routine off-site backup Procedure for activating vital information systems in a new location

Levels of Disasters Five levels Level 1: Threat of disaster without evidence Least threatening No actual damage has been done Possibility of Information being compromised without evidence left behind

Levels of… Cont’d Level 2: Actual attack without data loss Almost same as Level 1 Have proof of the attack but not how in depth the attack was. Level 3: Minor data/system loss Beginning of a disastrous event Data either lost, stolen or compromised Easier to repair

Levels of… Cont’d Level 4: Major data/system loss Not easy to repair Systems can be fixed as long as damages are dealt with immediately. Level 5: Total Loss Worst of the worst Information and technology almost impossible to recover Natural disasters Hurricanes, tornadoes, earthquakes etc…

Disaster Recovery Importance Without it, companies wouldn’t be sustainable Eliminates high cost of recovering data Example: September 11, 2001 Wide area outages Fiber optic telecommunication services

Who Uses It? Anyone and Everyone has the capability to use disaster recovery The majority that use disaster recovery are businesses or corporations Reasons: Companies have files that need to be kept away from the public: Patents Trade Secrets Financial Statements Etc.

Implementation IT Support Centers Run through a checklist: Detect Notify Repair To Detect: Pinpoint outage area geographically To Notify: Contact those who are professionals in disaster recovery within the company To Repair: Self explanatory, system must be repaired back to working order

Implementation Cont’d Cloud Computing Uses word processing, spread sheet, or programs that are installed somewhere other than on the computer upon which you are currently typing.

Implementation Cont’d Most Common Cloud Programs: Windows Skydrive Apple’s iCloud Google Drive

Conclusion What is Disaster Recovery? Levels of Disasters Disaster Recovery Importance Who Uses it? Implementation

Resources "Marketing Dictionary: Get SMART!" Marketing Dictionary: Basic Terms You Need to Succeed in Marketing. Web. 12 Apr Mitchell, Bradley. "Network Disaster Recovery - Overview." About.com Wireless/Networking. Web. 12 Apr Pappalardo, Joe. "Welcome to Popular Mechanics's High-Tech Shadow Office." Popular Mechanics. 22 July Web. 12 Apr Talon, Mike. "Classification System for Disaster Levels." TechRepublic. TechRepublic, 7 Nov Web. 12 Apr