High Availability for Information Security Managing The Seven R’s Rich Schiesser Sr. Technical Planner.

Slides:



Advertisements
Similar presentations
Business Continuity Technology Peter Lesser (212) Peter Lesser (212) Kraft Kennedy & Lesser, Inc. 360 Lexington.
Advertisements

OVERVIEW Virtualization Defined Server Virtualization
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Module – 9 Introduction to Business continuity
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
Chapter 13 Managing Computer and Data Resources. Introduction A disciplined, systematic approach is needed for management success Problem Management,
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
Chapter 19: Network Management Business Data Communications, 4e.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Date: 03/05/2007 Vendor Management and Metrics. 2 A.T. Kearney X/mm.yyyy/00000 AT Kearney’s IT/Telecom Vendor Facts IT/Telecom service, software and equipment.
Configuration Management Fault Management Performance Management Accounting Management Security Management.
Best Practices – Overview
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
EHealth Network Monitoring Network Tool Presentation J. Gaston Senior Network Design Seminar Professor Morteza Anvari 10 December 2004.
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Business Crisis and Continuity Management (BCCM) Class Session
November 2009 Network Disaster Recovery October 2014.
Effectively Explaining the Cloud to Your Colleagues.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Chapter Seven Process Modeling, Process Improvement, and ERP Implementation.
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
Network Management Network Management: –Overall administration from, Initial setup/installation to, Continuous maintenance of data communication network.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Eight Key Steps to Business Continuity Managing the Eight R’s Rich Schiesser Sr. Technical Planner.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Chapter 2: Non functional Attributes.  It infrastructure provides services to applications  Many of these services can be defined as functions such.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
1 TDTWG Report to RMS SCR 745 ERCOT Unplanned System Outages Wednesday, July 13th.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
SCSC 311 Information Systems: hardware and software.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Failure Analysis of the PSTN: 2000 Patricia Enriquez Mills College Oakland, California Mentors: Aaron Brown David Patterson.
Section 28.1 Marketing Information Systems
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Business Functions, Processes, and Data Requirements
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Retail Transaction Processing Year End Review and Recent Issues RMS January 2007.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
Reliability of KLOE Computing Paolo Santangelo for the KLOE Collaboration INFN LNF Commissione Scientifica Nazionale 1 Roma, 13 Ottobre 2003.
SCID Master Control 4/22/2014SCID Design Details Presentation1 Handheld Device (Walkie) Master Control (Managie) Data Protocol (Talkie)
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
Technology and Business Continuity
Sources of Failure in the Public Switched Telephone Network
Chapter 19: Network Management
Disaster Planning and Recovery
CompTIA Security+ Study Guide (SY0-401)
Adam Backman Chief Cat Wrangler – White Star Software
Managing Multi-User Databases
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Speaker’s Name, SAP Month 00, 2017
COP 5611 Operating Systems Fall 2011
Business Continuity Technology
Chapter 10 - X.25 and Network Management
Presentation transcript:

High Availability for Information Security Managing The Seven R’s Rich Schiesser Sr. Technical Planner

The Seven R’s 1. Redundancy 2. Reputation 3. Reliability 4. Repairability 5. Recoverability 6. Responsiveness 7. Robustness

1. Redundancy –Eliminating Single Points of Failure –Components power supplies central processors memory segments disk storage –Servers warm standby hot standby –Networks duplicate lines –Alternate Data Centers

Real Life Experience Duplicating Classified Components Classified environment of N G defense contractor presented unique challenges. Secured network links needed to be duplicated. Encryption devices were required to be redundant. Personnel with encryption keys had to be kept to a minimum.

2. Reputation Credibility of Track Record of Key Suppliers of Data Center Hardware And Software Methods to Verify Track Record - Market Share - Industry Analysts - Customer References

Real Life Experience The Good, the Bad, the Unbelievable The Good –EMC’s disk array hardware The Bad –EMC’s marketing tactics The Unbelievable –ET Phone Home!

3. Reliability - Frequency of Outages - Common Measurement is the Mean Time Between Failure (MTBF) - acquired from manufacturers - verified with customers - compared to industry analysts’ reports - collected and analyzed empirically - Methods to Collect and Analyze Data - trouble calls from clients - problem tickets from suppliers - feedback from client support personnel - feedback from supplier repair personnel

Real Life Experience Enterprise Security and Reliability 20 th Century Fox Motion Pictures entered lucrative home entertainment business in IBM AS/400 computers provided security and high availability for the highly critical applications. The only significant outage occurred when a power transformer exploded.

4. Repairability Duration of Outages Common Measurement is the Mean Time To Repair (MTTR) Other Factors to Consider –root cause analysis –repeatability of causes –incorrect diagnosis –use of rolling averages –analysis of trends over time

Real Life Experience Bugged by Telephone Companies Critical network link between two key divisions of an aerospace company kept failing intermittently. Problem was not solved until all seven hardware and software vendors were brought in together to brainstorm solutions. Analysis of data that showed patterns and trends finally solved the problem.

5. Recoverability Degree of Fault Tolerance Functional Operations –single and double-bit memory errors –disk and tape read/write retries –network transmission retries Hardware and Software Components –operating systems –servers, disks drives and tape drives –network lines and equipment Data Center Facility –power systems –air conditioning systems –fire suppression –computer rooms

Real Life Experience Accidental Testing in Production A marketing representative from a major server manufacturer got more than he bargained for while demonstrating his product’s failover capability. Fortunately for him and his company, the product performed as advertised.

6. Responsiveness Urgency of Support Manual Response –help desk resolution –dispatching to client support groups –escalation to suppliers or specialists Automated Response –self-detection and correction of errors –remote monitoring and circumvention of failing equipment –automated dispatching of service personnel

Real Life Experience IBM Supplies Air Support A major aerospace firm invested heavily in a critical IBM database system that began having software security problems. The DBA and IBM managers escalated to the highest levels of their respective companies. The vendor used a unique method to ensure its technical specialists arrived onsite on time.

7. Robustness Overall Quality of the System Able to Withstand a Variety of Disruptive Forces: –internal and external to the company –natural and man-made disasters Places a High Premium on: – documentation – training – analysis – continuous improvement

Real Life Experience Politically Charged Security Decisions California recently passed a law requiring, in some instances, disclosure of customer data to all residents of the state. A mortgage company recently encountered the theft of some desktop computers one month prior to enactment of the law. The company stepped up efforts to train employees on the impact of this new law, and methods to mitigate its effects.

Summary 1. Redundancy Elimination of Single Points of Failure 2. Reputation Credibility of Track Record 3. Reliability Frequency of Outages 4. Repairability Duration of Outages 5. Recoverability Degree of Fault Tolerance 6. Responsiveness Urgency of Support 7. Robustness Overall Quality of the System

Questions?

Thank You for Your Participation