David N. Wozei Systems Administrator, IT Auditor.

Slides:



Advertisements
Similar presentations
Information Technology Disaster Recovery Awareness Program.
Advertisements

Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
Systems Availability and Business Continuity Chapter Four Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
1 Outsourcing Contract and Service Level Issues Sharon O’Bryan Week 5 November 2, 2004.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Security Controls – What Works
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Evolving IT Framework Standards (Compliance and IT)
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Vital Records Fuel Your Recovery….. Donna Read, CRM Florida Gulf Coast ARMA November 16, 2010 Are You Running on Empty????
ISA 562 Internet Security Theory & Practice
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Business Continuity & Disaster recovery
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Information Systems Security Operational Control for Information Security.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Disaster Recovery and Business Continuity Planning.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
1 Backups Part of a Systems Administrators job is maintaining the integrity of the system. This does not mean that she is expected to prevent anything.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
DRP Disaster Recovery Planning. Social Networking... It's the way the 21st century communicates today.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Business Continuity Management 101. KeepItSafe Professional Services The portfolio of business continuity management is to ensure we assist our clients.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Business Continuity Planning 101
Welcome to the ICT Department Unit 3_5 Security Policies.
THINK DIFFERENT. THINK SUCCESS.
Local Area Networks, 3rd Edition David A. Stamper
Database recovery contd…
Planning for Application Recovery
CompTIA Security+ Study Guide (SY0-401)
Business Continuity / Recovery
Audit Planning Presentation - Disaster Recovery Plan
CompTIA Security+ Study Guide (SY0-501)
Business Contingency Planning
1 2 Please stand by! The webinar will begin shortly.
Business Impact Analysis
Developing and testing the Plan
Using the Cloud for Backup, Archiving & Disaster Recovery
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

David N. Wozei Systems Administrator, IT Auditor

ISACA Area 5 Protection of Information Assets Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets. Tasks _ Evaluate the design, implementation and monitoring of logical access controls to ensure the confidentiality, integrity, availability and authorized use of information assets. _ Evaluate network infrastructure security to ensure confidentiality, integrity, availability and authorized use of the network and the information transmitted. _ Evaluate the design, implementation and monitoring of environmental controls to prevent or minimize loss. _ Evaluate the design, implementation and monitoring of physical access controls to ensure that information assets are adequately safeguarded. _ Evaluate the processes and procedures used to store, retrieve, transport and dispose of confidential information assets.

Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact. Tasks _ Evaluate the adequacy of backup and restore provisions to ensure the availability of information required to resume processing. _ Evaluate the organization’s disaster recovery plan to ensure that it enables the recovery of IT processing capabilities in the event of a disaster. _ Evaluate the organization’s business continuity plan to ensure its ability to continue essential business operations during the period of an IT disruption. ISACA Area 6 Business Continuity and Disaster Recovery

What is Backup and Disaster Recovery all about? To backup is to have a secondary source of information (to stand in for the primary source). Business continuity is to ensure business critical and non-critical processes keep running. Disaster Recovery is a self- definition; recovering from a disaster. To rebuild a destroyed resource. There is an inherent risk to IT systems. BIA (risk based approach), BCP Identify the IT Systems as business critical and as business assets. (In relation to protection of Information assets) Look out for the risky areas.

Types of backup Full backup Creates an entire copy of each file on the system. This is the most effective backup method and requires a significant amount of time. It’s common for a full backup to be run at least once per week, but the frequency of your backup should depend on the value of your data. To restore data, the computer operator loads the latest full backup, usually from tapes. Next, the most current data is loaded by using files from a subsequent incremental or differential backup tape. Incremental method Copies only the files that have changed since the last backup. The incremental method is commonly used for backups on weekdays. This method requires less time than a full backup. Unfortunately, the file restoration process takes longer because it is necessary to restore the full backup and each version of incremental backup. An incremental backup resets the archive bit (backup flag) to indicate that a file needs to be backed up. If any of the tapes or disks in incremental restoration fails, the RPO will also fail. Incremental recovery requires using more tapes.

Types of Backup (continued…) Differential method Copies every file that has changed between full backup runs. Differential is the preferred method for business continuity. This method ensures that multiple copies of daily files should exist on multiple tapes. A differential backup is very fast on the first day after a full backup, and then takes longer each day as more files are copied. A differential backup works because the backup software does not change the archive bit (backup flag).

What are we auditing anyway? What are the assets and their configurations, locations etc? (This includes disaster recovery sites, primary sites, command sites...) What are their vulnerabilities or risks? Is there a Business Continuity Plan? Is there a Backup policy or Data Retention policy? Is there a Disaster Recovery Plan? Is there a team and individual business continuity manager responsible for these plans and policies or is implementation ad hoc? Has the risk been transferred? Are third-partied involved. Are users aware of the Plan? Is the plan comprehensive and does the team know when it is to be activated? Is the plan reviewed and tested periodically? Has a Business Impact Assessment ever been done?

What are we auditing anyway? (continued) Has the organisation decided not to adopt a plan at all? Is procurement aware of the plan? Are the financial implications of the plan known and are the finances available or feasible? Is security aware of the plan? (a security firm providing security to premises) Are utilities aware of the plan? (Electricity, Tel Cos, Water etc) How do we handle important documents in paper format? (For example, contracts, legal documents, land titles) How do we handle human lives, once there is a risk to them? Is there a specific period acceptable for recovery or downtime? Has the organisation decided not to have a plan?

What are the risks? Business collapse Financial loss Loss of life Loss of business property and assets Loss of information Damage to reputation Legal action Failure to resume business

Who should be involved in the effort to prevent a disaster? A BCP manager or 'owner'. Users Identify first responders Third-parties and out-sourced resources Those to whom risk has been transferred (Insurance Companies) Procurement Suppliers Top management IT department Security staff Any more, you can think of? Please list some…

Review of Documents, Policies, Plans Review of some documents with information on Backup and DR as well as Business Continuity.

THE END