YOUR HOST!YOUR HOST!YOUR HOST!YOUR HOST! HOSTSHOSTSHOSTSHOSTS NAMENAMENAMENAME.

Slides:



Advertisements
Similar presentations
© Mark E. Damon - All Rights Reserved Another Presentation © All rights Reserved
Advertisements

Template by Becky Afghani, 2007 Jeopardy Course Game Title: Category 1, Category 2, Category 3, Category 4, Category 5 GAME BOARDDIRECTIONS.
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Practical Preparations Planning for Safety and Emergencies.
$100 $400 $300$200$400 $200$100$100$400 $200$200$500 $500$300 $200$500 $100$300$100$300 $500$300$400$400$500.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200.
Category Category Category Category Category.
Subtitle Game Set-up & Host Directions Template developed by Brandy Thatcher, Illinois Central College Go to Each slide in the presentation and type.
Jeopardy Click the Start button to begin the game. On the Category Board, click the button to select your question. On each question card, click the button.
Auditing Computer-Based Information Systems
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
John Sell March 17, Disaster Recovery Emergency Management Incident Control including all Press Releases Communication to all employees Temporary.
1 Continuity Planning for transportation agencies.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Security Controls – What Works
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
EE579U/11 #1 Spring 2004 © , Richard A. Stanley EE579U Information Systems Security and Management 11: Business Continuity Planning Professor.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
 Mechanism for restoring a database quickly and accurately after loss or damage  RESPONSIBILITY OF ?????  Recovery facilities: Backup Facilities Backup.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Session 3 – Information Security Policies
Network security policy: best practices
Disaster Recovery Plan: Do you have one? Neal Cross, Assistant Director of Instructional Technology Shelly Brown, Director of Web Services Southwest Baptist.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
Continuity of Operations Planning COOP Overview for Leadership (Date)
Discovery Planning steps (1)
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
ENP Study Group Disaster Planning Session #6 BROUGHT TO YOU BY: THE FLORIDA NENA EDUCATION COMMITTEE.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security.
ISA 562 Internet Security Theory & Practice
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Perspectives on Business Continuity Management Bill Wheeler, EPO.
Information Systems Security Operational Control for Information Security.
Information Systems Security Operations Security Domain #9.
Backup and Recovery Overview Supinfo Oracle Lab. 6.
Developing Plans and Procedures
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
CRISIS-MANAGEMENT PLANNING Every business should develop a Security Crisis-Management team.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
This course, Essential Records Seminar, is part of
CONTROLLING INFORMATION SYSTEMS
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Business Continuity Disaster Planning
Disaster Recovery Planning Barry Navarre Charter Business.
Introduction to Business continuity Planning 6/9/2016 Business Continuity Planning 1.
6 Copyright © Oracle Corporation, All rights reserved. Backup and Recovery Overview.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Business Continuity Planning 101
Information Systems Security
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
Business Continuity Plan Training
Disaster Recovery at UNC
Continuity of Operations Planning
Presentation transcript:

YOUR HOST!YOUR HOST!YOUR HOST!YOUR HOST! HOSTSHOSTSHOSTSHOSTS NAMENAMENAMENAME

Group Play: A selected Game Show Host will keep the scores of 3 individual players or 3 teams of players. Any team members can ring in. If the question is answered correctly the team member chooses the next category. If not, the individual who choose the last category chooses again. This game follows the general format of the Jeopardy TV Show.

Select any $ dollar amount on the Jeopardy board. You will have 10 seconds to ring in. When you hear this sound, time is up. Answer in the form of a question. If the answer is incorrect, another team member may ring in. Mouse click on a ? to reveal the correct answer. ADD dollar amount for each CORRECT answer. SUBTRACT dollar amount for each INCORRECT answer. Return to the Jeopardy Board by mouse clicking on After the last dollar amount is selected and the question is answered, mouse click on the FJ to select Final Jeopardy. Final Jeopardy: Click on the Final Jprdy box located in Potpourri box. Each team can confer on the amount of money to bet and can confer on the Final Jeopardy answer and arrive at a team response.

INTROTHINGSACTIONSPERSONS MORE THINGS POTPOURRI $100 $200 $300 $400 $500 Final Jprdy Final Jprdy

$100 Answer : To ensure the prompt resumption of the Data Center operations and/or functionality after an emergency or major system disruption impacting IT functionality of an application (database, subnet, or specialized application) ? What is the purpose of a Contingency Plan? INTRODUCTION

$200 Answer : ? INTRODUCTION 1. 1.Notification/Activation 2. 2.Recovery 3. 3.Resumption What are the three phases of a Contingency/Disaster recovery Plan?

$300 Answer : ? INTRODUCTION All Agency personnel, contractors, service providers, and vendors that provide daily support to the Agency Data Center operations. Who does the plan apply to?

$400 Answer : ? INTRODUCTION The external network and router infrastructure serving the Data Center other than to specify who to contact regarding any disruptions of network and router service to the Data Center. What does the Plan NOT apply to?

$500 Answer : ? INTRODUCTION Minor System Failure Major System Failure What two scenarios are mentioned in the plan?

$100 Answer : ? THINGS Notify this person if there is damage to the facility or there is a power outage. Who is The Data Center Building Point of Contact?

$200 Answer : ?. THINGS Frequency of the Plan testing and training. What is annually?

$300 Answer : ? THINGS Frequency of the Plans review and update. What is quarterly?

$400 Answer : ? THINGS Used to assist in collecting the information required for an accurate damage assessment. What is the Damage Assessment Report Form?

$500 Answer : ? HARDWARE, SOFTWARE, & APPLICATION INVENTORY list and the HARDWARE COMPONENT INVENTORY list. What do you need to perform an effective assessment?THINGS

$100 Answer : ? ACTIONS Assists in all recovery and resumption activities, as necessary and Files an after-action report upon resumption of normal operations What does the recovery team do?

$200 Answer : ? ACTIONS Use an alternate facility for recovery until the facility/building becomes available again What do you do when the Data Center facility is not going to be available for an extended period of time (e.g., one month)?

$300 Answer : ? ACTIONS Gathers the components required to reconstruct the Data Center or critical parts of the Data Center at the alternate site (i.e., the servers, infrastructure, backup media.) What does the recovery Team do if it is determined that recovery will need to be at an alternate site?

$400 Answer : ? ACTIONS The person who the recovery team contacts to request that the appropriate vendors be contacted to provide additional support and/or components required for recovery as needed. Who is the Agency administrative support person

$500 Answer : ? ACTIONS The report that briefly describes the events that led to Plan Implementation and how operations were returned to normal conditions. What is the After-Action Report?

$100 Answer : ? Has ultimate responsibility for ensuring the development, execution, testing and maintenance of the Data Center Plans and for activation of the Plans Who is the Disaster/Contingency Plan Director? PERSONS

$200 Answer : ? The Alternate Disaster/Contingency Plan Director Who is Captain Midnight? PERSONS

$300 Answer : ? The Data Center 1 Team Leads Who are Tinker, Evers, & Chance? PERSONS

$400 Answer : ? PERSONS The data Center 2 Team Leads Who are Jurgensen, Snead, & Baugh?

$500 Answer : ? Responsible for obtaining and restoring data from the Agency backup tapes/disks/facilities. Who is the recovery Team? PERSONS

$100 Answer : ? EVENTS Circumstances, events, or acts that could cause harm to the Data Center by destroying, disclosing, modifying, or denying access to Agencys information resources What are threats?

$200 Answer : ? EVENTS The Data Center physical facility has been physically damaged to an extent that requires major repair to the environment and has rendered the facility unusable for an extended period of time What is a major disaster?

$300 Answer : ? EVENTS Flood, earthquakes, lightning strikes, severe storms, hurricane, tornado, volcano What are Natural threats?

$400 Answer : ? EVENTS Fire, temperature, humidity, power loss, liquid leakage, loss of communication medium What are Environmental threats?

$500 Answer : ? EVENTS Accidental system damage, theft, eavesdropping, sabotage/vandalism, improper handling of sensitive information, resource misuse and abuse, social engineering, unauthorized external access, unauthorized internal access, terrorism, impersonation, falsified input, interception, bribery, hacking, unauthorized disclosure of information, fraud, intimidation of personnel, negligence or human error, spoofing, unauthorized modification of information, system tampering, blackmail, malicious/mobile code, and password guessing What are Human Threats?

$100 Answer : ? POTPOURRI What is the Notification/Activation Phase? 1.To detect and assess damage, 2.Activate the plan, and 3.Notify all key personnel

$200 Answer : ? POTPOURRI When recovering the Data Center or any part of the Data Center, the recovery procedures should follow a logical order. What are Recovery Priorities?

$300 Answer : ? POTPOURRI The data storage backups are kept here. What are the Data Center 1 and Data Center 2?

$400 Answer : ? POTPOURRI What is the Reconstitution/Resumption Phase? The phase which constitutes the activities necessary to restore the Data Center operations to its original long term processing state.

$500 Answer : ? POTPOURRI Person that insures that information system security is maintained. Who is the Agency ISSO?

SECURITY DAILY DOUBLE

PERSON Category MAKE YOUR WAGER

The person (Title and Name) that is responsible for coordinating the recovery team.

Who is the recovery team Lead? Who is Superman?