SACRAO 2012 T2.08 Technical Disaster Recovery 2012 SACRAO.

Slides:



Advertisements
Similar presentations
Information Technology Disaster Recovery Awareness Program.
Advertisements

Planning for the Future Disaster Recovery Plan / Business Continuity Plan Jim Zukowski, Ed.D. Texas State Board of Dental Examiners 2006 Annual ConferenceAlexandria,
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
Join the conference call by dialing the conference number in your Invitation or Reminder s. Please put your phone on mute. Please stand by! The webinar.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
@TxSchoolSafety Continuity of Operations Planning Workshop Devolution & Reconstitution.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Disaster Recovery in IT David Irakiza CSC 585-High Availability and Performance Computing 2012.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Business Services Emergency Preparedness. Agenda Emergencies Emergencies Business Continuation Business Continuation University Plan University Plan Building.
Taking Care of Business How Your Department Can Continue Operations After An Emergency.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Disaster Recovery Plan: Do you have one? Neal Cross, Assistant Director of Instructional Technology Shelly Brown, Director of Web Services Southwest Baptist.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
By Drudeisha Madhub Data Protection Commissioner Date:
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
2008© COPYRIGHT 1 1 ATHN DATA SUMMIT DISASTER PREPAREDNESS JULY 31, 2008 PANEL MEMBER - JOY MAHURIN COMPREHENSIVE BLEEDING DISORDERS CENTER CONTINUITY.
Continuity of Operations Planning COOP Overview for Leadership (Date)
Discovery Planning steps (1)
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
HBCU National Workshop June 24, 2011 Disaster Recovery Reggie Brinson Assoc. VP/Chief Information Officer Clark Atlanta University.
ISA 562 Internet Security Theory & Practice
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
IT Infrastructure Chap 1: Definition
Developing a Disaster Recovery Plan Bb World ’06 San Diego, Calif. Poster Session Presented by Crystal Nielsen, M.A. Instructional Technologist Northwest.
David N. Wozei Systems Administrator, IT Auditor.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Developing Plans and Procedures
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
Annual Boys State Directors Conference Reviewing and Updating Crisis Management Plans Mike Bredeck Director of Minnesota.
This course, Essential Records Seminar, is part of
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
Install, configure and test ICT Networks
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
Business Continuity Disaster Planning
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Contingency Management in IT. Presentation Outline Components of contingency planning Insurance and backups Actual IT contingencies - Y2K problems - major.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Business Continuity Planning 101
Business Continuity Steven S. Keleman, CPM. Emergency Management Prevention Response Preparation Mitigation Recovery.
District’s Plan for Disaster Preparedness.
Peggy M. Jackson, DPA, CPCU Peg Jackson & Associates
DISASTER PREPAREDNESS After a Crisis of Any Size
Business Continuity Plan Training
1 2 Please stand by! The webinar will begin shortly.
Disaster Recovery at UNC
Continuity of Operations Planning
Presentation transcript:

SACRAO 2012 T2.08 Technical Disaster Recovery 2012 SACRAO

National Park Community College Hot Springs, AR 4,156 Students 231 Faculty and Staff 173 Adjunct Faculty Dr Allen B Moody Associate Dean for Academic Affairs

Rich Mountain Community College April 9, 2009

Rich Mountain Community College Classes at the Mena campus resumed at Rich Mountain Community College April 20, 2009 – 11 days later. 70% of classes could be held on campus. Rich Mountain is using two separate locations for the other thirty percent of classes. Chancellor Wayne Hatcher reported that the Arkansas Disaster Insurance was providing excellent coverage with up to eighty percent or more coverage of expenses for damage. ADHE has requesting additional funds through the Federal Stimulus program. AATYC member colleges have helped the campus with its immediate classroom/computers needs and related staff support. The biggest concern at the present time is for the faculty/staff and students that suffered due to the tornado. Eight (8) faculty/staff members lost their homes and belongings. We are not sure of the total number of students that suffered a loss. Rich Mountain is committed to providing counseling to those faculty/staff and students in need. Rich Mountain has set-up a task force of four (4) to five (5) individuals to coordinate the efforts to collect furniture and other necessary supplies for those that lost everything in the storm.

2009 Legislation The Arkansas Campus Security Enhancement Act Task Force Timeline Aug.19, 2009 First Meeting at ADHE Sep.1, 2009 Task Force to Receive Safety Plans From Each Institution For Review Sep.1, 2010 Provide Written Review & Guidelines The Task Force shall meet at least quarterly; The Task Force shall cease to exist by December 31, 2010

Methods to initiate campus-wide emergency notification (%)

Need a continuity of operations plan

Step One: Policy Without policy, having technology in place is pointless What policies are needed? – Campus emergency response plan – Information Technology emergency response plan – Departmental emergency response plan

Business Continuity Plan (BCP) Identification of Stakeholders IT infrastructure Data backup and recovery Available resources Continuity requirements Disaster prevention methods Analysis of an organization’s business processes including

Campus Emergency Response Plan Public document usually maintained by Campus Police/Public Safety/Security department Includes public versions of all departmental and administration wide disaster recovery plans Details the following, at a minimum: – Definition of “major” and “minor” emergencies and “disaster” – Roles of all of the major players – Emergency response command center – Who is authorized to respond to news media – How rebuilding after an emergency/disaster will be handled – Training and rehearsal Reviewed annually

Disaster Recovery is the process, policies and procedures related to preparing for recovery or continuation of Technology Infrastructure critical to an organization after a natural or human-induced disaster Disaster Recovery Planning

Physical securityData accessCritical servicesPasswords and user accountsBackups and data storageInternet and useIT security software

Prevention Local mirrors of systems and/or data and use of disk protection technology such as RAID Surge protectors — to minimize the effect of power surges on delicate electronic equipment Uninterruptible power supply (UPS) and/or backup generator in the event of a power failure Fire preventions — alarms, fire extinguishersAnti-virus software and other security measures Implementation of precautionary measures to prevent a disaster in the first place.

What is Data? Paper records Digital records All that stuff you have in your head but never put on paper How is it stored? – Filing cabinets, cardboard boxes, under the coffee cup – CD/DVD – Hard drive – Network storage – “The Cloud”

Data Protection Common strategies for data protection. Backups made to tape/disks/offsite disks Replication of data to an off-site location, which overcomes the need to restore the data (only the systems then need to be restored or synchronized). This generally makes use of storage area network (SAN) technology Replication of data to an off-site location, which overcomes the need to restore the data (only the systems then need to be restored or synchronized). This generally makes use of network attached storage (NAS) or storage area network (SAN) technology

NAS vs. SAN NAS = Network Attached Storage – External hard drive connected to a network – Small hard drive array connected to a network – Accessed via a network drive icon on the computer – NOT an enterprise level solution SAN = Storage Area Network – Large storage array – Used by servers – Users don’t even know it’s there – Very expensive, massive storage capacity

Cloud Storage High availability systems which keep both the data and system replicated off-site, enabling continuous access to systems and data Online backup systems are typically built around a client software program running a schedule, typically once a day, and usually at night. The program collects, compresses, encrypts, and transfers the data to the remote backup service provider's servers

“The Cloud”

Phase I – Analysis and Evaluation Include timeline, resources, and expected output Risk Assessment and Business Impact Analysis Onsite and Offsite Backup and Recovery Procedures Alternate site location selection Phase II – Plan Development and Testing Development of Disaster Recovery Plan Testing the plan Implementation of the DRP Phase III – Monitoring and Maintenance Maintenance of the Plan through updates and review Periodic inspection of DRP Documentation

Stakeholder analysis.Project scope and critical processes.Project definition statement.College Unit listings and contact informationDependencies.Timeline planning.Project goal statements.Stakeholder communications plan.

Immediate Reaction for the Office  Evacuation of the Facility  Secure critical data  Gather all work in process and all unprocessed work  Key personnel to assist in evacuation  List of disabled, pregnant, individuals or those who have medical problems  Gather at a Pre-Determined location  Department head counts  Notification of missing staff  Remain in location until called upon for disaster relief or released

Recovering from a Disaster A. People always come first Are you safe Is your family safe Are your co-workers safe B. Place Is your home safe/stable Do you have transportation Is your campus accessible Is your office accessible C. Infrastructure Is there power Do the phones work Is there Internet Did IT survive D. Systems Procure replacement hardware Install hardware/software Recover data from backup Test and return to service