Unformatted text preview:

Study Guide 370Business Continuity Process-Business processes prioritized by importanceEX. Sales more important in short term than engineering1. Perform business impact analysis2. Prioritize services to support critical business processes3. Determine alternative processing models for critical and vital services4. Develop disaster recovery plan for IS systems recovery5. Develop BCP for business operations recovery and continuation6. Test plans7. Maintain PlansAlternative Recovery Strategies- Hot Siteo Fully configuredo Ready to operate within hourso Fastest - Warm Siteo Ready to operate within dayso No or low power main computero Contains disks, networks, peripherals- Cold Siteo Ready to operate within weekso Contains electrical wiring, air conditioning, flooringo Slowest - Duplicate or Redundant info. Processing facilityo Standby hot site within organization- Reciprocal agreemento With other organization or division- Mobile siteo Fully or partially configured trailer comes to your siteo Microwave or satellite communicationsBusiness Continuity Test Types-Start with simplest tests and proceed to more complex- Checklist reviewo Reviews coverage of plano Important concerns covered?- Structured Walkthrougho Reviews all aspects of plano Walking through different scenarios- Simulation Testo Execute plan based upon specific scenarioo Without alternate site- Parallel Testo Bring up alternate off-site facility without bringing down regular site- Full-Interruptiono Move processing from regular site to alternate siteDisruption vs. Recovery Costs- Cost vs time- Curve showing cost of having system down & another curve showing the costof Bringing an alternative system up quickly- Least cost- cross point of two curvesRPO- Recovery Point Objective- How far back can your data fail?- One-week vs one hour of dataRTO- Recovery Time Objective- How long can you operate without system?- Services last how long?- Can vary by day of the yearo Ex. Scheduling system for school most important week before and first week- Management sees larger pictureTypes of Networks1. Local Area Network (LAN)a. Computers connected at single physical site2. Wide area network (WAN)a. Computers connected between two or more separated sites3. The internet and internetsa. Networks of networksProtocols- In network computing- a protocol is a system of digital rules for message exchange within or between computers- Official procedure or system of rules governing affairs of state or diplomatic occasions- Accepted or established code of procedure or behavior in any group, organization or situation- Communicating systems use well-defined formats for exchanging messageso Each message has exact meaning to provoke specific response of servero Protocol must define the syntax, semantics & synchronization of communicationNetworks operate in layers- protocol1. Applicationa. Ex. SMTP (email), HTTP for web pages, FTP file transfersb. Does something user wants donei. Ex. Managing email or requesting/loading web resource2. Transport/Interneta. Break message into packetsb. Address them to right targetc. Reassemble them after3. Network interfacea. Guided by previous internet layerb. Manage signals (light, electricity or vibrations), on each network on the internet to pass the packets alongProtocols used on Internet, arranged to an international standardized structure- TCP/IP protocol -Five protocol types arrange in layers, definedProtocols- SMTP-Simple mail transfer protocolo Manages email between clients and servers- HTTP- Hypertext Transfer Protocolo Manages requests and responses to support access to internet (web) resources- TCP/ICP- Transmission Control Protocol/Internet Protocolo Packetizes and routes messages between computers- Etherneto Manages signals (electrical impulses) on connected wireso Resolving conflicts when connected computers send signals at same timeo Handles conversations between a few computers ‘sharing’ messagesInternetworking Devices- Switcheso Computers attached by wires to a switcho Keeps track of which computer is on each lineo Sends packet only to desired destinationo Improve performance and security- Hubso Usually wirelesso Hubs send out packets by radio so nearby computers can pick upo Rare to use wired (physically connected) hubs Price and performance of switches better so no point in buyingo Subject to security and performance issuesRouters- Connects numerous networks- Each cluster shares hub or switch & governed by protocol- Ethernet- Packets find way from network to network searching for destinationVPN-Virtual Private Network- Uses internet to create secure, private point-to-point connection- Protected locations or users identified- Protocols set up to prove particular target is allowed to see data from host network- VPN hardware and software create tunnels between networkso Data encrypted before sendingo Decrypted when received- VPN devices change the from IP address on packets so computers involved think packets were generated on local network- Remote VPN client establishes connection to VPN server via internet- Connection can be through local ISP or organization that provides direct internet connection- VPN client or VPN server creates secure point-to-point connections called tunnels N-Tier Client/Server pg. 301- Each server focuses on what it does best- Browsers instead of client software- Integrate authentication- Tiers talk to each other using network tools- Client<>Server o User tiero User browser- Client<>Servero Server Tiero Web server (manages session) Who are youo Application server (GP dynamics) What do you want to do- Client<>Servero Database Tiero Database server What do you want to know What should I rememberNew information system requires integration and customization- Old system- organization connected and working with old system: people, process inputs, outputs, data stores- New system- requires tuning, data filters or transla--- tors to match requirements of new system as well as training and other process changes- Outsourcingo Transferring all or part of an organization’s IT function to 3rd party- Offshoringo Company hires employees in another country to perform functions- Offshore outsourcingo Company transfers all or part of function to 3rd party in another country- Many variations of outsourcing existo Often-cited potential benefits sought in an outsourcing contract include reduced cost, improved service, or a more secure infrastructureo In-house expertise expensive

View Full Document

OSU BA 370 - Study Guide

Download Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...

Join to view Study Guide and access 3M+ class-specific study document.

We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Guide 2 2 and access 3M+ class-specific study document.


By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?