Download presentation
Presentation is loading. Please wait.
Published byEmily Walton Modified over 9 years ago
2
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC
3
Security+ Chapter 8 – Preparing for and Preventing Disasters Brian E. Brzezicki
4
Disaster Recovery (372) Disaster Recovery is a part of Business Continuity Planning that attempts to ensure that a business can continue to operate in the event of a disaster. DR planning is mainly concerned with Availability however in DR planning and organization should also ensure that confidentiality and integrity is not violated in the event of a disaster.
5
Disaster Types (372) Disaster can be of many types including Natural disasters Fires Physical Attacks Hacking Attacks Personnel loss Hardware loss Unexpected data destruction
6
Disaster Recovery (373) Any disaster recovery plan should include controls that allow for BOTH Redundancy Backups These are NOT the same thing, and both are necessary.
7
Basic Steps for DR planning (373) Identify critical business functions Identify resources that are necessary for the critical functions Identify threats to assets Identify preventative controls Identify recovery controls Develop a disaster plan Test the plan
8
Redundancy One important concern in DR planning is to determine resources that are a single point of failure which could halt your critical business functions. Storage resources Important Servers Network Connections
9
Storage Redundancy
10
RAID 0 - 376 Raid 0 – striping (see visual) Fast access No redundancy Actually increases probability of failure
11
RAID 1 - 377 Raid 1 – mirroring (see visual) – Identical copies of data – Expensive – Faster than a single disk for reading – Can lose a disk – What is disk duplexing
12
Normal RAID 1 - 377
13
RAID 1 - Disk Duplexing (n/b)
14
RAID 5 377 RAID 5 – Striped sets with parity – At least 3 disks – Capacity of one disk “lost” / more disks less waste – Fast reads – Writes can be slower, especially small writes – Can lose single disk – If disk lost you are in “critical mode” Another disk, total failure Slow operation while in critical mode
15
RAID 5 (377)
16
Server Redundancy
17
Servers are a critical component in information systems. If the important are unavailable for any reason, even for a short time that could be a disaster and cause significant loss or damages. A goal of server availability is often stated as 5 nines. Which is 99.999% availability. When designing important systems you need to understand your desired availability and engineer your systems to provide that level of service.
18
SAN
19
Clustering (Active/Passive)
20
Clustering (Active/Active)
21
Spare Parts (379) When preparing your DRP, you should always consider the possibility that some equipment will be destroyed (maybe even RAID etc). You should understand the Mean Time To Replacement (MTTR) and how long replacement equipment or fixes will take, and if necessary stockpile spare parts! Especially if you have legacy equipment.
22
Legacy Equipment
23
Site Redundancy
24
Alternate sites (383) Types of sites are provided by a “service bureau” Hot site – fully configured ready for operation in a few hours – Fully stocked with common hardware and software – Can be used for DRP testing – Expensive Warm site – Only partially configured with some hardware and software, expected that you will bring much of your own equipment – Cannot really be used for DRP testing – Less Expensive Cold site – Just basic environment (space, AC, power etc) – No equipment – Cannot be used for DRP testing – Cheapest option
25
Alternate Site An important concept to understand is that after the disaster has been handled, you will eventually want to return processing to the original site (or an permanent replacement). When moving services back, you should always move the least critical services first.
26
Alternate sites (n/b) Rather than having a “subscription service” the company may own it’s own redundant sites Mirror sites Multiple data processing sites
27
Power Protection
28
Power systems are critical to any operation. It is important you understand some of the different types of power equipment. Line Conditioners UPS Generators
29
Data Backups
30
Backups (387) Backups are a critical component in not only DRP but also “normal operation”. You need to understand the traditional type of backups discussed on the next few slides Full Backups Incremental Backup Differential Backup
31
Backup types First thing we need to talk about is the “archive bit” – what is it? Type of backups (next slides) Full Incremental Differential
32
Full (387) All data everyday! Clear archive bit after backups
33
Incremental (389) Only files that changed since last full or last incr Reset the archive bit
34
Differential (388) Only files changed since last full or diff DO NOT reset the archive bit
35
Restores Understand the process for restoring Full Backups Incremental backups Differential backups
36
Testing Backups (391) Data created by an organization is critical to it’s success. A simple hard drive crash can be a catastrophic disaster of it’s own if proper backup measures are not religiously practiced. Just because you perform backups is not enough you also need to ensure Tests restores are regularly performed to ensure the backups are working correctly Job rotation occurs so that more than one staff member can restore a system in an emergency All important data is backed up Backup and restore procedures are documented Backups are stored both onsite and offsite if possible Backups are archived for long term storage
37
Protecting Backups (392) Leakage of the backups can result in loss of confidentiality, thus you should take care to ensure that backups are protected onsite and offsite and that the people who perform backups are not using that privilege to access information they are not allowed to normally access. Dual control, auditing and encryption are a few controls you can implement to protect confidentiality in backups.
38
Environmental Controls
39
Fire Suppression (393) It is important that you have a basic understanding of fire suppression as even computer systems are vulnerable to fires. To put out a fire, you must remove either Heat Oxygen Fuel Disrupt the chemical process of combustion
40
Fire Suppression (393) There are different fire suppression types based on class of fires which will be discussed in the next few slides A B C D
41
Fire Suppression (394) A – Common Combustibles Use for: Wood, paper, laminates Uses water, foam or dry powder as suppression agent B – Liquid Use for: gas or oil fires Use: Gas (CO2), foam, dry powders
42
Fire Suppression (394) C – Electrical Use on: electrical equipment and wires Uses: Gas, CO2, dry powder D – Combustible materials Use on: combustible chemicals (sodium, potassium) Uses: dry powder
43
Halon and CO2 CO2 can be used to extinguish a fire. Halon removes the oxygen which is required for combustion. However CO2 will also suffocate people so should not be used except for the most specific situations and special steps must be taken to protect human life in the event of a CO2 release. Halon was also used to extinguish fires by interrupting combustion. It is not deadly to humans but depletes the ozone layer and was banned by the Montreal protocol
44
HVAC A basic understanding of some HVAC concepts are required especially when building data centers. HVAC systems should immediately be shutdown in the case of a fire HVAC systems should provide positive pressure pushing contaminants out of a room Humidity must be properly balanced. Too little humidity causes static electricity discharge, too much causes electronic equipment to rust.
45
Plenum (n/b) The space between the ceiling and the floor above is called the plenum. Cables are run through this area and any cables run need to be plenum cable which uses a special insulator that gives off less toxic fumes when burning compared to normal cabling.
46
Electrical Shielding Not related to disaster recovery, but important electrical equipment needs to be shielded both to stop RFI interference – Commonly caused by fluorescent lights EMI – Commonly caused by motors
47
TEMPEST (397) It is also possible for confidentiality violations due to emanations of electrical equipment. TEMPEST is a government program to protect against this. Some methods that TEMPEST employs are Faraday Cages White Noise Generators
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.