Download presentation
Presentation is loading. Please wait.
1
Disaster Prevention and Recovery
2
Team Members Gwenn Cooper Kristy Short John knieling Carissa Vancleave Matthew Owens
3
Agenda Introduction Prevention and Recovery Plan IT Security Functions Computer Crime Viruses COBIT Wrap-up
4
August 29 th, 2005 Katrina
5
brought in pharmacy staff members from other markets and housed them in 50 RVs sent to stores in hard-hit areas. hired new employees throughout the Gulf Coast who have lost their jobs because of the hurricane. activated a new, proprietary pharmacy computer system that allows some of the steps in the prescription filling process to be done by Walgreens pharmacies in other areas. Prior to the hurricane, this system was only being tested in Florida. www.walgreens.com/about/press/othernews/091505.jsp
6
Disaster Recovery Plan Defined: Disaster recovery plans ensure continuous service and recovery from any disaster. Disaster recovery plans ensure continuous service and recovery from any disaster. Jones & Rama, “Accounting Information Systems.”
7
Steps to Prevention Assessing Risk Geographical area Mapping critical functions Downtime IT Policy Controls Employees Other aspects www.businesseye.org.uk/respirce/3080.61523.file.enq.pdf
8
Testing ISACA Hypothetical; Component; Module; Full Testing Alarm Testing Natural Disaster Testing www.isava.org
9
Salvaging Techniques Saving wet documents; salvaging wet furniture; repairing structural damage; remove mold. Disaster Services Inc. FEMA HTTP//PALIMPSEST.STANFORD.EDU
10
IT Security Functions Information Classification ‘open’, ‘confidential’, ‘secret’, ‘top secret’ Documentation Rules Security handbook User Identification and Authorization User names,passwords, access cards, biometrics Logging Who, when, where, what? www.interpol.int/public/technologycrime/crimeprev/itsecurity.asp#5
11
IT Security Functions Back-ups Interpol recommends a 5-step process. (shown on next slide) Firewalls Packet filtering system Application-level gateway Intrusion Detection Systems (IDS) Statistical detection Pattern matching detection Incident Handling (IH) Preparation, Identification, Containment, Eradication, Recovery, Follow-up
12
Backing up your data 1. Make sure that regular back-up copies are made of both data and system files. 2. Back-up cycles should be of sufficient length to be of some use in the future. 3. Take a full back-up (of both the system and the data) out of the cycle on a regular basis and archive it off site for an extended period. 4. Back-up tapes/diskettes should be kept in a safe place under lock and key and away from the computer. Should be secured from fire, flood, or any other disaster, and preferably off site. 5. Periodically test the back-up to ensure that the information can actually be restored in an emergency. Interpol recommends the following 5-step process when making back-ups:
13
Computer Crime Computers becoming primary communication Email, instant messaging, etc. Two types of computer crime 1 - using a computer to commit a crime 2 - criminal activity that targets a computer Internal threats vs. External threats Prevention
14
Viruses What are computer viruses? Computer viruses are basically a type software program, which has been deliberately created to interfere with computer operation and can cause the following effects. Slow your computer down Record unwanted data Corrupt data Delete data
15
COBIT COBIT was a publication created by the IT Governance Institute (ITGI). Provides educational information on control objectives, management guidelines, and managing changes. Includes a maturity model to offer businesses a tool for measuring their current level of IT sophistication and seeing how they align with their current business strategy. Suggests that a business should control its IT process through impact assessment, authorization and implementation of any changes to its IT system Accomplished by defining and communicating procedures, and by assessing, authorizing and reporting changes. IT Governance institute- cobit
16
Wrap-up 50-70% of companies go out of business after a disaster 40% have plans to recover data Lose time, money, resources Any Questions? WWW.DATACLINIC.CO.UK/DATA-BACKUP.HTMWWW.DATACLINIC.CO.UK/DATA-BACKUP.HTM, WWW.LANSPEED.COM
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.