Slide 1Slide 2Slide 3Slide 4Slide 5Slide 6Slide 7Slide 8Slide 9Slide 10Slide 11Slide 12Slide 13Slide 14Slide 15Slide 16Disaster Prevention and Recovery Date: 5/16/06By:Stacie LundLien HuynhKatie AllenWhy do we need to be concerned?●Disasters can occur at anytime–Technology increases risk and vulnerability –Hackers are able to do more damage–Business cannot function without IS technology–Cannot guarantee sustainability of the businessDisaster Threats●Environmental- Hurricane Katrina●Loss of Utilities/Services- Electrical Power outages, Communication breakdowns●Equipment or system failure- Heaters or Washing machines●Serious IS failure- Cyber crime●Organized/Deliberate- COB Summer 2005Prevention ●Disaster avoidance–Contingency plans–Back-up/redundant systems–Monitor notifications systems–Tests–SecurityAvoiding Disasters●Monitor/Planning–COBIT●Identify possible disaster scenarios–Quality Control●R.A.I.D–Redundant Array of Independent Discs- P drives on COB serverContingency plans●Provides step-by-step information in a disaster–Identify key risks–Creates a plan that is practical–Creates a RACI chart to notify individuals–Provides testing and maintenance plans to ensure recoveryExample of Contingency planRedundant systems●Good hardware, employees and software●Back-up Systems–All data need to be saved●Constantly●Prioritize tasks and data●Save and archive all important data–Store back-ups in different locations–Extra space●Always more storage than you will ever needNotification systems●All systems need notification–Allows individuals to know when a problem has occurred–Wall monitors send out signals●ALL NOTIFICATION SHOULD BE TESTED●RACI Chart–All individuals know responsibilities in an event of an emergencyExample of a Notification SystemExample RACI chartExample RACI chartDrills/Tests●Train and over train all individuals●Time all results●Diversify plans for testing (different times, days)●Consistency ●Should tests be run during peak times?Security●Network Security policies–Firewalls–Anti-virus–Spy-ware–All of the above must be updated, tested and proven effectiveRecovery●Invest prevention is costly●File back-ups–Create alternative locations for storage●Two storage systems 100 miles away●Should employees take back-ups
View Full Document