Unformatted text preview:

Study Guide 370 Business Continuity Process Business processes prioritized by importance EX Sales more important in short term than engineering 1 Perform business impact analysis 2 Prioritize services to support critical business processes 3 Determine alternative processing models for critical and vital services 4 Develop disaster recovery plan for IS systems recovery 5 Develop BCP for business operations recovery and continuation 6 Test plans 7 Maintain Plans Alternative Recovery Strategies Hot Site o Fully configured o Ready to operate within hours o Fastest Warm Site Cold Site o Ready to operate within days o No or low power main computer o Contains disks networks peripherals o Ready to operate within weeks o Contains electrical wiring air conditioning flooring o Slowest Duplicate or Redundant info Processing facility o Standby hot site within organization Reciprocal agreement o With other organization or division Mobile site o Fully or partially configured trailer comes to your site o Microwave or satellite communications Business Continuity Test Types Start with simplest tests and proceed to more complex Checklist review o Reviews coverage of plan o Important concerns covered Structured Walkthrough o Reviews all aspects of plan o Walking through different scenarios Simulation Test o Execute plan based upon specific scenario o Without alternate site Parallel Test Full Interruption o Bring up alternate off site facility without bringing down regular site o Move processing from regular site to alternate site Disruption vs Recovery Costs Cost vs time Curve showing cost of having system down another curve showing the cost of Bringing an alternative system up quickly Least cost cross point of two curves RPO Recovery Point Objective How far back can your data fail One week vs one hour of data RTO Recovery Time Objective How long can you operate without system Services last how long Can vary by day of the year first week Management sees larger picture Types of Networks 1 Local Area Network LAN o Ex Scheduling system for school most important week before and a Computers connected at single physical site 2 Wide area network WAN a Computers connected between two or more separated sites 3 The internet and internets a Networks of networks Protocols In network computing a protocol is a system of digital rules for message exchange within or between computers Official procedure or system of rules governing affairs of state or diplomatic Accepted or established code of procedure or behavior in any group occasions organization or situation Communicating systems use well defined formats for exchanging messages o Each message has exact meaning to provoke specific response of o Protocol must define the syntax semantics synchronization of server communication Networks operate in layers protocol 1 Application a Ex SMTP email HTTP for web pages FTP file transfers b Does something user wants done i Ex Managing email or requesting loading web resource 2 Transport Internet a Break message into packets b Address them to right target c Reassemble them after 3 Network interface a Guided by previous internet layer b Manage signals light electricity or vibrations on each network on the internet to pass the packets along Protocols used on Internet arranged to an international standardized structure TCP IP protocol Five protocol types arrange in layers defined Protocols SMTP Simple mail transfer protocol o Manages email between clients and servers HTTP Hypertext Transfer Protocol o Manages requests and responses to support access to internet web resources TCP ICP Transmission Control Protocol Internet Protocol o Packetizes and routes messages between computers Ethernet time o Manages signals electrical impulses on connected wires o Resolving conflicts when connected computers send signals at same o Handles conversations between a few computers sharing messages Internetworking Devices Switches o Computers attached by wires to a switch o Keeps track of which computer is on each line o Sends packet only to desired destination o Improve performance and security Hubs o Usually wireless o Hubs send out packets by radio so nearby computers can pick up o Rare to use wired physically connected hubs Price and performance of switches better so no point in buying o Subject to security and performance issues Routers Connects numerous networks Each cluster shares hub or switch governed by protocol Ethernet Packets find way from network to network searching for destination VPN Virtual Private Network Uses internet to create secure private point to point connection Protected locations or users identified Protocols set up to prove particular target is allowed to see data from host network VPN hardware and software create tunnels between networks o Data encrypted before sending o Decrypted when received VPN devices change the from IP address on packets so computers involved think packets were generated on local network Remote VPN client establishes connection to VPN server via internet Connection can be through local ISP or organization that provides direct VPN client or VPN server creates secure point to point connections called internet connection tunnels N Tier Client Server pg 301 Integrate authentication Each server focuses on what it does best Browsers instead of client software Tiers talk to each other using network tools Client Server o User tier o User browser Client Server o Server Tier o Web server manages session Who are you o Application server GP dynamics What do you want to do Client Server o Database Tier o Database server What do you want to know What should I remember New information system requires integration and customization Old system organization connected and working with old system people process inputs outputs data stores New system requires tuning data filters or transla tors to match requirements of new system as well as training and other process changes Outsourcing Offshoring Offshore outsourcing o Transferring all or part of an organization s IT function to 3rd party o Company hires employees in another country to perform functions o Company transfers all or part of function to 3rd party in another country Many variations of outsourcing exist o Often cited potential benefits sought in an outsourcing contract include reduced cost improved service or a more secure infrastructure o In house expertise expensive to develop and maintain SLA Service Level Agreements o Important tool for managing


View Full Document

OSU BA 370 - Study Guide

Download Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Guide and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?