Premium Essay

Business Continuity and Disaster Recovery Planning for It Professionals

In:

Submitted By ibrendy
Words 189146
Pages 757
436_XSS_FM.qxd

4/20/07

1:18 PM

Page ii

443_Disaster_Rec_FM.qxd

5/25/07

3:07 PM

Page i

Visit us at w w w. s y n g r e s s . c o m
Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site.

SOLUTIONS WEB SITE
To register your book, visit www.syngress.com/solutions. Once registered, you can access our solutions@syngress.com Web pages. There you may find an assortment of valueadded features such as free e-books related to the topic of this book, URLs of related
Web sites, FAQs from the book, corrections, and any updates from the author(s).

ULTIMATE CDs
Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime
Investigation, Open Source Security, and Firewall Configuration, to name a few.

DOWNLOADABLE E-BOOKS
For readers who can’t wait for hard copy, we offer most of our titles in downloadable
Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably.

SYNGRESS OUTLET
Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings.

SITE LICENSING
Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. Contact us at sales@ syngress.com for more information.

CUSTOM PUBLISHING
Many organizations welcome the ability to combine

Similar Documents

Premium Essay

Lab 3.2

...risk analysis (RA) and a business impact analysis (BIA)? Risk analysis is a technique to identify and assess factors that may jeopardize the success of a project or achieving a goal. Business continuity planning "identifies an organization's exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization, while maintaining competitive advantage and value system integrity”. In addition to some disagreement among business continuity professionals regarding the BIA and risk assessment definitions and outcomes, disagreement also exists regarding the order of execution: whether it is best to perform the risk assessment before, during, or after the BIA. While many professionals argue that it is best to perform the risk assessment before the BIA to establish the risk landscape in which the organization operates, Evaluation argues the opposite. What is the difference between a Disaster Recovery Plan and a Business Continuity plan? A disaster recovery plan is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such plan, ordinarily documented in written form, specifies procedures an organization is to follow in the event of a disaster. Business continuity planning "identifies an organization's exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization...

Words: 1291 - Pages: 6

Premium Essay

Class Work

...which could be used by a business as part of its recovery during disaster recovery or business continuity operations. You may focus upon the incident reported upon in your cybersecurity research paper OR you may take a more general approach. Your research will then be used to prepare a presentation (Power Point slides) in which you discuss how your selected solutions could be used to address cybersecurity problems specific to DR / BCP operations. Your presentation must also address the importance of disaster recovery planning and/or business continuity planning with respect to maintaining the confidentiality, integrity, and availability of information and information systems. Consult the grading rubric for specific content and formatting requirements for this assignment. The focus of your research for this assignment should be DR / BCP technology solutions for response and recovery after a cyber security incident of sufficient duration and impact to require activation of the organization’s Disaster Recovery and/or Business Continuity Plan. Suggested technology solutions include: * General DR/BCP Services * Palindrome http://www.youtube.com/watch?v=d60m6hUpgvs * Data Backup Solutions * Acronis http://www.acronis.com/solutions/smallbusiness/ * Cloud Computing (Infrastructure as a Service, Software as a Service, Platform as a Service) * VMWare http://www.vmware.com/solutions/datacenter/business-continuity/disaster-recovery.html * NetApp...

Words: 646 - Pages: 3

Premium Essay

Emergency Planning and Business Continuity Management and How It May Be Integrated with Security Risk Management.

...Abstract Businesses, both large multinational and small to medium, should take the threats and risks they could face seriously. Security Risk Management (SRM), Business Continuity Management (BCM) and Emergency Planning (EP) assist in achieving this by putting in place effective risk identification and management measures. Effective management of risk can make the difference between success or failure of business operations during and after difficult events. Threats can include man made threats, such as terrorist attacks, or naturally occurring threats such as earthquakes. Effective risk identification and management is essential to any business, especially with the current uncertainty in the world’s economic climate. In order for businesses to survive, during times of increased strain on business operations, it is essential that an alignment between security and business operations can be achieved. This can be achieved by the security department not only widening the remit to cover more risks, but changing how the department works and relates to the rest of the business; including shared responsibility for things such as Corporate Governance, Information Assurance, Business Continuity, Reputation Management and Crisis Management. The problem is security departments now have more responsibilities in an increasingly complex and fast moving world. Security Risk management is no longer an activity just for companies who work in high-risk areas or with exposure to significant...

Words: 5764 - Pages: 24

Premium Essay

Virus Attacks

...Chapter 3 Planning for Contingencies Chapter Overview The third chapter of the book will articulate the need for contingency planning and explore the major components of contingency planning. In this chapter, the reader will learn how to create a simple set of contingency plans using business impact analysis and prepare and execute a test of contingency plans. Chapter Objectives When you complete this chapter, you will be able to: • Understand the need for contingency planning • Know the major components of contingency planning • Create a simple set of contingency plans, using business impact analysis • Prepare and execute a test of contingency plans • Understand the unified contingency plan approach Introduction This chapter focuses on planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill. “Procedures are required that will permit the organization to continue essential functions if information technology support is interrupted.” On average, over 40% of businesses that don't have a disaster plan go out of business after a major loss. What Is Contingency Planning? The overall planning for unexpected events is called contingency planning (CP). CP is the process by which organizational planners position their organizations to prepare for, detect, react to, and recover from events that threaten the security of information resources and assets, both human and...

Words: 3573 - Pages: 15

Premium Essay

The Effects of a Business Continuity Plan on Information Systems

...Effects of a Business Continuity Plan on Information Systems Ronald E. Stamm Jr. ISYS 204 Professor Choi October 6th, 2011 Abstract Since the dawn of the new millennium, as more and more companies are becoming more technologically savvy, they have been coming to the realization that there is a need to protect that data somehow. These companies seek out IT professionals who help them create Business Continuity Plans. These Business Continuity Plans help companies better safeguard and effectively retain their essential data in the case of a catastrophic failure of their network infrastructure. In this essay, I will be discussing the different intricacies of a Business Continuity Plan and how to effectively build one to suit the needs of the individual company. The Effects of a Business Continuity Plan on Information System A frog if put in cold water will not bestir itself if that water is heated up slowly and gradually and will in the end let itself be boiled alive, too comfortable with continuity to realize that continuous change at some point may become intolerable and demand a change in behavior. (Handy, 1990) There have been so many companies over the years that have failed due to lack of a proper Business Continuity Plan. Taking the time and utilizing the correct resources to create a Business Continuity Plan can easily counteract this. In this essay, I will provide an example of a few companies who did not have proper Business Continuity Plans and how...

Words: 3859 - Pages: 16

Premium Essay

Doctor in Sar Dx

...[pic] ביה"ס לניהול וכלכלה – התוכנית לניהול מערכות מידע 1 . פרטי הקורס |שם הקורס בעברית |היערכות לחירום והמשכיות עסקית BCLE1500 | |שם הקורס באנגלית |BCLE1500 | |שנה |סמסטר |תואר ראשון/שני |שם מקוצר באנגלית | | | | |עד 8 אותיות | |תשע"ג |א' | |BCLE1500 | 2 . סגל הקורס מרצה |שם פרטי בעברית |שם משפחה בעברית |שם פרטי באנגלית |שם משפחה באנגלית | |שלום |דוד |SHALOM |DAVID | |טלפון לפרסום (לא חובה) |דוא"ל |שעת קבלה | | |0504916155 |Shalom.david.cyber@gmail.com |בהמשך לשיעור שיקבע | | מתרגל – זהה למרצה |שם פרטי בעברית ...

Words: 1822 - Pages: 8

Premium Essay

Bcp Planning and Development

...Company Virtual Solutions Inc. Foundations of Business Continuity Management Table of Contents Executive Summary 3 Introduction 5 About Company Virtual Solutions 6 The Current Status of Business Continuity Planning 6 Historical Context 6 The New Plan 8 Using Recovery Planner 8 Configuration for TPT 9 Presentation 9 Compliance 10 Comprehensive Planning 10 Leadership Approval 12 The Plan Strategy 12 Team Structure 12 Figure 1: The Business Continuity Plan Team Organizational Chart 13 Emergency Management Team 13 Business Continuity Team 14 Business Unit Teams 15 Fly Out Teams 16 Fire Teams 16 The Four Phases of the Plan 16 Figure 2: The four phases of the Plan 16 Phase I - Appraisal 17 Phase II – Recovery Coordination 18 Phase III - Production 18 Phase IV – Site Restoration 19 Business Unit Plan Structure 20 Alternative Sites 21 Planning Refinement Recommendations 22 Risk Assessment 22 Business Impact Analysis 22 Emergency Response 23 Disaster Recovery 23 Testing and Restoration 24 Future State 25 Comprehensive Business Planning 25 ACP Workflow Planning 26 Awareness and Training 27 Maintaining Support 27 Projected Timeline 28 Figure 3: Projected Timeline 29 Tasks 29 Conclusion 30 Sources 31 Appendix...

Words: 6761 - Pages: 28

Premium Essay

Business Continuity Plan

...Workplace Continuity and Contingency planning MAN3554 4-5-13 Abstract The objective for this paper is to explain through an example, of what I have learned from our class discussion, learning activities, and our readings of Chapters 16 and 17 in our text, A Risk Management Approach to Business Continuity. It will show my personal understanding through explaining through an example of how applying the risk management theory to the production of a business continuity plan is important. The situation background for our risk assessment plan will be based on the following crisis; Suppose you own a small convenience market, about the size of a 7-11 or a Circle K, or any other comparable franchise outlet that you might be more familiar with given your location in the country. The child of a customer, left in a running vehicle, manages to shift the car into forward and it plows through the front of your store, sending debris and stock flying, and causing an indeterminate amount of damage to your facility. Based on this information, we were then asked to prepare a disaster assessment and recovery plan for resuming business. The information that we have been asked to include is; • Damage assessment; to the building, to people, to stock, to utilities. • Identify critical actions; for example, does anyone need emergency medical care? What do you do about perishables like frozen foods (if you have lost power)? • Repairs and recovery; including...

Words: 933 - Pages: 4

Premium Essay

Pricinples of Information Security, Chapter 5 Review Questions

...to plan the tasks to be accomplished and the order in which to proceed. What is information security governance? Governance is “the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.”1 Governance describes the entire process of governing, or controlling, the processes used by a group to accomplish some objective. Just like governments, corporations and other organizations have guiding documents—corporate charters or partnership agreements—as well as appointed or elected leaders or officers, and planning and operating procedures. These elements in combination provide corporate governance. Each operating unit within an organization also has controlling customs, processes, committees, and practices. The information security group’s leadership monitors and manages all of the organizational structures and processes that safeguard information. Information security governance, then, is the application of the principles of corporate governance—that is,...

Words: 4589 - Pages: 19

Premium Essay

Risk

...n d M a n u a l s Operational Risk Management and Business Continuity Planning for Modern State Treasuries Ian Storkey Fiscal Affairs Department I N T e r N A T I o N A l M o N e T A r y F U N D INTerNATIoNAl MoNeTAry FUND Fiscal Affairs Department Operational Risk Management and Business Continuity Planning for Modern State Treasuries Prepared by Ian Storkey Authorized for distribution by Sanjeev Gupta November 2011 DISCLAIMER: This Technical Guidance Note should not be reported as representing the views of the IMF. The views expressed in this Note are those of the authors and do not necessarily represent those of the IMF or IMF policy. JEL Classification Numbers: Keywords: H12, H60, H63, H83 business continuity, disaster recovery, business continuity and disaster recovery plan, operational risk, operational risk management, treasury operations ian@storkeyandco.com Author’s E-Mail Address: TECHNICAL NoTEs ANd MANUALs Operational Risk Management and Business Continuity Planning for Modern State Treasuries Prepared by Ian Storkey This technical note and manual (TNM)1 addresses the following main issues: • What is operational risk management and how this should be applied to treasury operations. • What is business continuity and disaster recovery planning and why it is important for treasury operations. • How to develop and implement a business continuity and disaster recovery plan using a six practical-step process and how to have...

Words: 10882 - Pages: 44

Premium Essay

Disaster Planning and Management

...Communications of the IIMA 25 2006 Volume 6 Issue 2 Disaster Planning and Management Holmes E. Miller Muhlenberg College, Allentown, PA 18104 Kurt J. Engemann Iona College, New Rochelle, NY 10801 Ronald R. Yager Iona College, New Rochelle, NY 10801 ABSTRACT Recent events such as hurricanes, tsunamis, earthquakes, power outages, and the threat of pandemics have highlighted our vulnerability to natural disasters. This vulnerability is exacerbated by many organizations’ increasing dependence on computer, telecommunications, and other technologies, and trends toward integrating suppliers and business partners into everyday business operations. In response many organizations are implementing disaster recovery planning processes. In this paper we discuss how to identify threats and scenarios; how to articulate the disaster recovery strategies; and four elements of the generic disaster recovery plan: Mitigation, preparedness, response, and recovery. We then provide examples of software that can help disaster recovery professionals in the planning and implementation process. Finally we present some trends that will reinforce the criticality of the issue. Keywords: Disaster Recovery Planning; Business Continuity Planning; Risk Assessment INTRODUCTION Several major natural disasters that have occurred in the past few years have placed disaster management on the front pages: The Tsunami of late 2004, Hurricanes Katrina and Rita, and the earthquake in Pakistan in 2005 affected both...

Words: 7241 - Pages: 29

Premium Essay

Marketing and Exports Co-Ordinator

...Strategic component answers the question "why do security enterprise problems exist?" This question of security leads to developing security policies that deal with people issues, and evaluates internal/external risks. Organizations are urging top executives to make information security a priority. Therefore, quality and trustworthiness of information are becoming key business issues (Ezingeard et al, 2005). To better accomplish information security in an organization, a management level infrastructure approach is needed. Just as information and data characteristics are different at the different levels of management, information security has different characteristics at the different levels of management. These levels of management are strategic, tactical, and operational. At the operations level, transaction data is produced and serves as input to create information. Maintaining and monitoring of integrity, confidentiality, and availability of the transaction data are primary objectives which are supported by organizational procedures and guidelines. At the tactical level, information is interpreted and utilized in decision making. Implementations of preventative, detective, and responsive controls are a primary objective which is supported by organizational standards. Further analysis/aggregation of the information creates knowledge to help make strategic level decisions Information security policy provides a framework to ensure that systems are developed and operated in...

Words: 1173 - Pages: 5

Premium Essay

Disaster Management

...[pic] Records Management Disaster Planning Guideline June 2007 Version 1.1 Table of Contents Acknowledgments 5 Foreword 5 Introduction 6 Background 6 Scope of this guideline 6 Related Documents 6 Reference to the Adequate Records Management Standard 7 Variation to this guideline 7 Records and Disasters 7 Disasters affecting records 8 Disasters affecting Australian organisations 8 Counter disaster management for records 9 Disaster review of your agency 10 Risk Assessment 10 Establish the context 11 Identify the risks 11 Critical needs determination 13 Analyse the risks 14 Assess the risks 15 Treat the risks 15 Monitor and review 16 Planning 16 Project Planning 17 Project team responsibilities 18 Content of the plan 18 How to prepare the response and recovery plan 19 Components of the response and recovery plan 20 Lists and supplies 22 Insurance and emergency funding arrangements 23 On-site equipment 23 Implementing the plan 24 Maintaining the plan 24 Distribution issues 25 Plan maintenance responsibilities 25 Training and testing 25 Post disaster analysis 27 Vital Records Protection 28 Identifying vital records 29 Protecting vital records 31 Preventative measures 31 Recovery and restoration 33 Critical data...

Words: 16993 - Pages: 68

Free Essay

It Essay

...The first interesting topic is the service management, which is including service strategy, service design, service transitions, service operation, and continual service improvements. These will add more improvements to the business such as the quality assurance; follow up with tasks, and continual service improvements programs. These is also a certificate in this field called ITIL, which stands for Information Technology Infrastructure Library. This certificate is starting from foundation to expert level, and it is a great to have especially for the IT managers. “Executives (Directors and above) are more positive about ITIL than general IT, most likely because they most strongly own the need for IT transformation” (AXELOS, 2014) The second interesting topic is the security, which is nowadays one of the most demanded IT major worldwide. “planning for a terrorist incident is, in many ways, very similar. Nearly one in five business suffer a major disruption every year”. (Business Continuity and Disaster Recovery for InfoSec Managers, 2005). Therefore, it is important to protect the business from any incident related to the IT security. There are many IT security certificates and the most demanded one is CISSP (Certified Information Systems Security Professional). In conclusion, the IT service management has got a high demand in the current markets as well as the IT security. Also, since there is a...

Words: 401 - Pages: 2

Premium Essay

Csec 650 Individual Assignment 2

...IA2: Business Continuity Plan for Information Technology CSEC 650 University of Maryland University College Abstract Business contingency and continuity of operations plan are vital to business, especially those reliant on digital media. Whether through nature events or the more likely interruption of computer systems and networks, a disruption of any type is a serious business concern. A disruption can harm operational revenue, services, supply-chain, and reputation. Any of the preceding effects from a disruption could possibly be severe enough to mean the end of business as a going concern. To avoid severe or long term damaging disruption, a comprehensive contingency plan can provide a guide for how resources and personnel will be allocated in the event of a crisis. Keywords: Business Continuity Plan (BCP), Information Technology, contingency plan Table of Contents Business Continuity Plans 4 Planning Steps 5 Business Impact Analysis 6 Recovery Strategies 8 Data Backup 10 IT Personnel Training 10 Alternate Site 11 Contingency Plan Development 12 Training and Testing 13 Recommended Training and Testing 14 Test Schedule 15 Summation 17 References 18 Business Continuity Plans Greater numbers of businesses now must consider the protection of their computer information systems as a vital aspect of their operations. Even as organizations became ever more reliant on computer systems over the past several decades, information technology (IT) contingency planning was not...

Words: 4274 - Pages: 18