CompTIA Security+ Study Guide (SY0-501)

Slides:



Advertisements
Similar presentations
Information Technology Disaster Recovery Awareness Program.
Advertisements

Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Service Design – Section 4.5 Service Continuity Management.
1 An Overview of Computer Security computer security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Computer Security: Principles and Practice
Concepts of Database Management Seventh Edition
Advanced Databases DBA: Backups 1. Advanced Databases Agenda Define backup Discuss Backup Terminology Explain various backup and restore options in Oracle.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Incident Response Updated 03/20/2015
Services Tailored Around You® Business Contingency Planning Overview July 2013.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
November 2009 Network Disaster Recovery October 2014.
Security audits. Today’s talk  Security audits  Penetration testing as a component of Security auditing  Different types of information systems security.
CISA REVIEW The material provided in this slide show came directly from Certified Information Systems Auditor (CISA) Review Material 2010 by ISACA.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
General Awareness Training
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES
Concepts of Database Management Sixth Edition
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
BACKUP & RESTORE The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
David N. Wozei Systems Administrator, IT Auditor.
Concepts of Database Management Eighth Edition
Business Continuity & Disaster recovery
1 Availability Policy (slides from Clement Chen and Craig Lewis)
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Disaster Recovery and Business Continuity Planning.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
1 Chapter Overview Understanding Data Restoration Issues Understanding the Types of Database Backups Understanding the Restoration Process.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SecSDLC Chapter 2.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Disaster Recovery. Refer to the process,policy and procedure related to recovery or continuation of technology infrastructure critical to an organization.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Information Security Crisis Management Daryl Goodwin.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information Systems Security
Local Area Networks, 3rd Edition David A. Stamper
Chapter 12: Disaster Recovery and Incident Response
Planning for Application Recovery
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Processing Integrity and Availability Controls
Section 15.1 Section 15.2 Identify Webmastering tasks
CompTIA Security+ Study Guide (SY0-401)
DATA COLLECTION, MANAGEMENT AND ANALYSIS
Thomas Hayes Business Continuity and Disaster Recovery
Business Contingency Planning
CS/IS 196 Final Exam Review
Presentation transcript:

CompTIA Security+ Study Guide (SY0-501) Chapter 12: Disaster Recovery and Incident Response

Chapter 12: Disaster Recovery and Incident Response Explain penetration testing concepts Explain vulnerability scanning concepts Given a scenario, follow incident response procedures Summarize basic concepts of forensics Explain disaster recovery and continuity of operation concepts

Penetration Testing Penetration testing Steps in penetration testing Goal: to simulate an attack and look for holes that exist in order to be able to fix them Steps in penetration testing Verify a threat exists Bypass security controls Actively test security controls

Vulnerability Scanning Involves looking for weaknesses in networks, computers, or even applications Five major tasks Passively testing security controls Interpreting results Identifying vulnerability Identifying lack of security controls Identifying common misconfigurations

Business Continuity Business continuity planning (BCP) The process of implementing policies, controls and procedures to counteract the effects of losses, outages, or failures of critical business processes Critical business functions (CBFs) Two key components of BCP Business impact analysis (BIA) Risk assessment

Storage Mechanisms Working copy backups On-site storage Are partial or full backups that are kept at the computer center for immediate recovery purposes On-site storage Usually refers to a location on the site of the computer center that is used to store information locally

Chapter 12: Disaster Recovery and Incident Response The ability to recover system operations after a disaster Backups Are duplicate copies of key information, ideally stored in a location other than the one where the information is currently stored

Backup Plan Issues A disaster-recovery plan Helps an organization respond effectively when a disaster occurs Understanding backup plan issues Database systems User files Applications

Knowing Backup Types Full backup A complete, comprehensive backup of all files on a disk or server Incremental backup A partial backup that stores only the information that has been changed since the last full or the last incremental backup Differential backup Backs up any files that have been altered since the last full backup; it makes duplicate copies of files that haven’t changed since the last differential backup

Developing a Backup Plan Grandfather, Father, Son method Based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly Full Archival method Works on the assumption that any information created on any system is stored forever Backup Server method Establishes a server with large amounts of disk space whose sole purpose is to back up data

Chapter 12: Disaster Recovery and Incident Response Recovering a system Backout vs. backup Alternate or backup sites Hot site Warm site

Chapter 12: Disaster Recovery and Incident Response Incident response plan (IRP) Outlines what steps are needed and who is responsible for deciding how to handle a situation Incident Is the occurrence of any event that endangers a system or network Incident response Encompasses forensics and refers to the process of identifying, investigating, repairing, documenting, and adjusting procedures to prevent another incident

Incident Response Process Step 1: Identifying the incident Step 2: Investigating the incident Step 3: Repairing the damage Step 4: Documenting and reporting the response Step 5: Adjusting procedures

Forensics from the Security+ Perspective Act in order of volatility Capture system image Document network traffic and logs Capture video Record time offset Take hashes Capture screenshots Talk to witnesses Track man-hours and expenses

Chapter 12: Disaster Recovery and Incident Response Table-top exercises Simulate disaster