Disaster Recovery Strategies & criteria for evaluation of information management strategies.

Slides:



Advertisements
Similar presentations
Presented by Peter Gubarevich Optimal Solutions, Ltd Conference Microsoft IT Pro Tallinn, December 01, 2011 Something About Restoring Your Server.
Advertisements

Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3.
Auditing Computer-Based Information Systems
© 2008 Kroll Ontrack Inc.| Ontrack PowerControls 5.1 The ultimate “power tool” for SharePoint administrators.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Disaster Recovery and Business Continuity Gretchen Grey.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Factors to be taken into account when designing ICT Security Policies
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
JOBS IN IT.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Business Crisis and Continuity Management (BCCM) Class Session
Level 4 and Level 5. What is Covered in the Unit Effective use of Folders and Files. Effective use of Microsoft Word. Effective use of Microsoft PowerPoint.
November 2009 Network Disaster Recovery October 2014.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Discovery Planning steps (1)
Overview of Systems Audit
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
Systems Investigation and Analysis
Human Resources Crisis Management and Contingency Management HL ONLY.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
ISA 562 Internet Security Theory & Practice
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Information Systems Security Operational Control for Information Security.
Planning for the Worst, Hoping for the Best Deborrah Glenn-Long Connecticut Student Loan Foundation Note: In order to minimize file size, all background.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
National Archives and Records Administration, Preparing for the Unexpected ESSENTIAL ELEMENTS: ANALYSIS.
Why is it important to back up your work/information? If you do not back up your work or information then your data might be lost when your computer clashes.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
This course, Essential Records Seminar, is part of
Mobile Data Analytics v7.1 Architectural Overview Does one size fits all? Mobile Data Analytics v7.1 Disaster recovery strategiesA.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
The Problem YOU are responsible for confidential, mission- critical data... but.
Computer Architecture CIS 222 Computer Architecture CIS 222.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Managing Data & Information Procedures & Techniques.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
Business Continuity Disaster Planning
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Disaster Recovery Management By: Chris Rozic COSC 481.
Business Continuity Awareness Steve Lambert Biscon Planning Ltd.
Linda Hanwacker MSCS, MBA, CBCP. Information Technology (IT) – hardware and software used to store, retrieve and process data Communication Technology.
Processing Integrity and Availability Controls
Archive / Destruction / Disposal
Computer Control & Audit
Unit 7 – Organisational Systems Security
Understanding Back-End Systems
Emerging Audit and Internal Control Issues
Developing and testing the Plan
The Survival Plan.
MANUFACTURING DISASTER RECOVERY PLAN
Presentation transcript:

Disaster Recovery Strategies & criteria for evaluation of information management strategies

Disaster Recovery Strategies A document with steps needed to restore company operations in event of a disaster Four key parts: 1.Emergency Plan –Names & contact details of people to notify –Procedures to follow with computer equipment –Evacuation procedures for employees –Return procedures

Disaster Recovery Strategies 2Backup Plan –Location of alternative sites & equipment –Location of backup data, supplies, eq/ment –Personnel responsible for gathering backup resources –Schedule indicating order & approximate time applications up and running

Disaster Recovery Strategies 3Recovery Plan –Covers hardware & software replacement –Identification of mission critical ICT services –Use of a backup site 4Test Plan –Simulation of variety of disasters & recovery needs

Evaluating the effectiveness of data security measures Integrity of data –accuracy, reliability and timeliness in terms of storage, communication and disposal –Accuracy, eg. storage, it contains all data; communication, arrives accurately, no viruses; disposal, selected files deleted or copied Security –Evaluate physical & software security, eg. audit trails

Evaluating the effectiveness of data security measures Ease of retrieval –Observance of folder & file-naming conventions –Backed up files need to be able to be restored Currency of files –Regular backups –Use of sequential file-naming conventions