IT SOFTWARE, DATA, AND CONTINGENCY PLANNING

Slides:



Advertisements
Similar presentations
The Relational Database Model:
Advertisements

Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Processing Integrity and Availability Controls
Concepts of Database Management Seventh Edition
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Database Design and Introduction to SQL
Chapter 1 1 © Prentice Hall, 2002 Database Design Dr. Bijoy Bordoloi Introduction to Database Processing.
November 2009 Network Disaster Recovery October 2014.
Chapter 1 1 © Prentice Hall, 2002 Database Design Dr. Bijoy Bordoloi Introduction to Database Processing.
Discovery Planning steps (1)
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Copyright © 2003 by Prentice Hall Module 4 Database Management Systems 1.What is a database? Data hierarchy and data organization Field, record, file,
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Concepts of Database Management Eighth Edition
Chapter 3-1 Ch. 3 –Data Modeling Designing an efficient and effective database that meets users’ needs.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 5th Edition Copyright © 2015 John Wiley & Sons, Inc. All rights.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
Information Security Crisis Management Daryl Goodwin.
Information Systems Security
Introduction to Databases Transparencies
Introduction to Databases Transparencies
Planning for Application Recovery
Database Management Systems
Computers Are Your Future
AS ICT Module 2 Objectives: Security of Data
Managing Multi-User Databases
Determining BC/DR Methods
Introduction to Computing Lecture # 13
Disaster Recovery Constituent Group
The Impact of Cloud Technology on Multi-Unit Operators
Information Systems Today: Managing in the Digital World
Atlas Lee, CBCP Director Of Business Continuity
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
Session XIa - halFILE Disaster Recovery
Disaster Recovery and SQL for new and non-DBAs
Introduction to Databases Transparencies
Agenda Backup Storage Choices Backup Rule
Introduction to Databases
Processing Integrity and Availability Controls
Introduction to Databases
System And Application Software
Data Base System Lecture 2: Introduction to Database
Chapter 6 System and Application Software
Introduction to Databases
Atlas Lee, CBCP Director Of Business Continuity
3 Cloud Computing.
Chapter 1: The Database Environment
Atlas Lee, CBCP Director Of Business Continuity
MANAGING DATA RESOURCES
Disaster Recovery is everyone’s job!
Introduction to Databases
Introduction to Databases Transparencies
ບົດທີ 6 ການຄຸ້ມຄອງຊັບພະຍາກອນຂໍ້ມູນ (Managing Data Resource)
DATABASE TECHNOLOGIES
Chapter 6 System and Application Software
Chapter 6 System and Application Software
The Database Environment
Chapter 6 System and Application Software
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management
Database management systems
Database Design Chapter 7.
Presentation transcript:

IT SOFTWARE, DATA, AND CONTINGENCY PLANNING

SOFTWARE Applications Programs executed by the hardware. Written in programing language System software OS Utility Applications

SOFTWARE Programing Languages. First generation Second Generation Binary Second Generation Assembly languages—largely superseded by; Third Generation COBOL, FORTRAN, BASIC, C, C++, Java Fourth Generation Generalized Audit Software (GAS), Computer Assisted Audit Techniques, HTML, XML, XBRL

Bits & Bytes, Fields & Records 1s & 0s STORAGE Bits & Bytes, Fields & Records 1s & 0s

File Organization Flat files Databases Spread sheets Sequential tape mounted Databases Hierarchical—parent, child,… Relational—tables linked by key fields (attributes). System of cardinality How unique i.e. Customer ID has high cardinality—one # for each customer Referential Integrity Record entered in one table must have an attribute that appears in another table.

File Organization Object oriented DB Great for graphic and multimedia objects, but not good for accounting data.

Database Management Systems Software that enforces DB rules and requirements. Use SQL as: Data definition language Data manipulation language

Application Development & Maintenance Needs assessment Current system adequate? If not, which needs aren’t met. Can current system be modified? Plan for future Examine business processes Redesign if required

Application Development & Maintenance Business process design should be a bottom up process. Next—Build or Buy? Cost-benefit Can we buy a system that matches our business processes, or; Modify processes to fit system Modify system to fit existing processes

Application Development & Maintenance Business process design should be a bottom up process. Next—Build or Buy? Cost-benefit Build system in house that matches processes No inexpensive choices here!

Application Development & Maintenance DEV, QUA, PROD Systems Development Lifecycle Q&A

Contingency Planning Business Continuity—problem Plan to continue operations when the IS is down. Disaster Recovery—big problem Plan to recover from a major disaster and resume or continue operations.

Contingency Planning Cloud computing could help firms with disaster recovery. DRaaS Data, software, platform reside on the vendor’s server farms. When contracting with vendors, pay close attention to the contract service agreement (CSO) terms. What if a disaster takes out one of the farms? Backup Plans Backup data and software and store offsite. How often? Depends on transaction volume. How many day’s, hours, minutes of transactions can you afford to lose?

Contingency Planning Cost-Benefit Analysis Cost of backups and redundant systems vs Value of lost data and sales. i.e. cost of backup power supply vs cost of lost sales/minute. Fault tolerant systems—redundant array of independent drives (RAID) Recovery Time Objective (RTO)--target time set for the recovery of IT and business activities after a disaster has struck Recovery Point Objective (RPO)--time between data backups and the amount of data that could be lost in between backups. How much data can you afford to lose?

Contingency Planning Disaster Recovery Plan Based on risk analysis. What are the threats? Natural disasters Human disasters Which operations are mission critical? Will people die? What preventative and detective controls are in place? Cloud Redundant sites Redundant personnel

Contingency Planning Disaster Recovery Plan People Hardware Communication Cell and internet service may not function. Have a plan Location to meet and regroup Backup meeting location Plan for replacing personnel and performing duties Hardware Contract with a vendor for a backup site from which to continue operations. Hot site Warm site Cold site

Contingency Planning Disaster Recovery Plan Software and Data Backup in a secure location Cloud helps with this, but we are still transitioning. Public Cloud vs Private Cloud Public—very careful with vendor contract. Private—much more complicated.