SlideShare a Scribd company logo
1 of 58
1
CompTIA Security+ Guide to Network
Security Fundamentals, Sixth Edition
Chapter 14
Business Continuity
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Objectiaves
14.1 Describe the different types of wireless
network attacks
14.2 List the vulnerabilities in IEEE 802.11
security
14.3 Explain the solutions for securing a wireless
network
© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
3
What is Business Continuity?
• Business Continuity
• An organization’s ability to maintain operations after a disruptive event
• Business continuity preparedness involves:
• Business continuity planning
• Business impact analysis
• Disaster recovery planning
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
4
Business Continuity Planning (BCP)
• BCP is the process of:
• Identifying exposure to threats
• Creating preventative and recovery procedures
• Testing them to determine if they are sufficient
• BCP consists of three essential elements:
• Business recovery planning
• Crisis management and communications
• Disaster recovery
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
5
Business Impact Analysis (BIA) (1 of 2)
• BIA - identifies business functions and quantifies the impact a loss of
these functions may have on business operations
• These range from:
• Impact on property (tangible assets)
• Impact on finance (monetary funding)
• Impact on safety (physical protection)
• Impact on reputation (status)
• Impact on life (wellbeing)
• A BIA will help determine the mission-essential function
• Activity that serves as the core purpose of the enterprise
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
6
Business Impact Analysis (BIA) (2 of 2)
• A BIA can also help in the identification of critical system
• That support the mission-essential function
• Identifying a single point of failure
• Which is a component or entity in a system which will disable the entire
system, should it no longer function
• Minimizing these single failure points results in high availability
• Many BIAs also contain a privacy impact assessment
• Used to identify and mitigate privacy risks
• Privacy threshold assessment
• Can determine if a system contains personally identifiable information
(PII)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
7
Disaster Recovery Plan (DRP) (1 of 5)
• Disaster recovery plan (DRP)
• Focuses on protecting and restoring information technology functions
• Written document detailing process for restoring IT resources:
• Following a disruptive event
• Comprehensive in scope
• Intended to be a detailed document that is updated regularly
• Most DRPs:
• Have a common set of features
• Cover specific topics
• Require testing for verification
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
8
Disaster Recovery Plan (DRP) (2 of 5)
• Features
• Typical outline of a DRP:
• Unit 1: Purpose and Scope
• Unit 2: Recovery Team
• Unit 3: Preparing for a Disaster
• Unit 4: Emergency Procedures
• Unit 5: Restoration Procedures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
9
Disaster Recovery Plan (DRP) (3 of 5)
• Topics
• Sequence in restoring systems (order of restoration)
-Which systems should have priority and be restored before other
systems?
• What should be done if a disaster makes the current location for
processing data no longer available
-An alternative processing site must be identified
-Failback – the process of resynchronizing data back to the primary
location
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
10
Disaster Recovery Plan (DRP) (4 of 5)
• Testing
• Disaster exercises are designed to test the effectiveness of the DRP
• Disaster exercise objectives
• Test efficiency of interdepartmental planning and coordination in
managing a disaster
• Test current DRP procedures
• Determine response strengths and weaknesses
• Tabletop exercises
• Simulate an emergency situation but in an informal and stress-free
environment
• An after-action report should be generated
• To analyze the exercise results to identify strengths to be maintained
and weaknesses to improve upon
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
11
Disaster Recovery Plan (DRP) (5 of 5)
Feature Description
Participants Individuals on a decision-making level
Focus Training and familiarizing roles, procedures, and
responsibilities
Setting Informal
Format Discussion guided by a facilitator
Purpose Identify and solve problems as a group
Commitment Only moderate amount of time, cost, and resources
Advantage Can acquaint key personnel with emergency
responsibilities, procedures, and other members
Disadvantage Lack of realism; does not provide a true test
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
12
Fault Tolerance Through Redundancy
• Fault tolerance
• Refers to a system’s ability to deal with malfunctions
• The solution to fault tolerance is to build in redundancy
• Which is the use of duplicated equipment to improve the availability
of a system
• A goal is to reduce a variable known as the mean time to recovery
(MTTR)
-The average amount of time that it will take a device to recover
from a failure that is not a terminal failure
• Redundancy planning
• Applies to servers, storage, networks, power, sites, and data
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
13
Servers (1 of 3)
• Servers
• Play a key role in network infrastructure
• Failure can have significant business impact
• Clustering
• Combining two or more devices to appear as a single unit
• Server cluster
• Multiple servers that appear as a single server
• Connected through public and private cluster connections
• Types of server clusters
• Asymmetric
• Symmetric
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
14
Servers (2 of 3)
• In an asymmetric server cluster, a standby server performs no function
except to be ready if needed
• Used for databases, messaging systems, file and print services
• All servers do useful work in a symmetric server cluster
• If one server fails, remaining servers take on failed server’s work
• More cost effective than asymmetric clusters
• Used for Web, media, and VPN servers
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
15
Servers (3 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
16
Storage (1 of 6)
• Storage - a trend in data storage is to use solid-state drives (SSDs)
• SSDs are more resistant to failure and are considered more reliable
than traditional HDDs
• HDDs are often the first components to fail
• Some organizations keep spare hard drives on hand
• Mean time between failures (MTBF)
• Measures average time until a component fails and must be replaced
• Can be used to determine number of spare hard drives an organization
should keep
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
17
Storage (2 of 6)
• Redundant Array of Independent Devices (RAID)
• Uses multiple hard disk drives to increase reliability and performance
• Can be implemented through software or hardware
• Several levels of RAID exist
• RAID Level 0 (striped disk array without fault tolerance)
• Striping partitions hard drive into smaller sections
• Data written to the stripes is alternated across the drives
• If one drive fails, all data on that drive is lost
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
18
Storage (3 of 6)
• RAID Level 1 (mirroring)
• Disk mirroring used to connect multiple
drives to the same disk controller card
• Action on primary drive is duplicated on
other drive
• Primary drive can fail and data will not
be lost
• Disk duplexing
• Variation of RAID Level 1
• Separate cards used for each disk
• Protects against controller card failures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
19
Storage (4 of 6)
• RAID Level 5 (independent disks with distributed parity)
• Distributes parity (error checking) across all drives
• Data stored on one drive and its parity information stored on
another drive
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
20
Storage (5 of 6)
• RAID 0+1 (high data transfer)
• Nested-level RAID
• Mirrored array whose segments are RAID 0 arrays
• Can achieve high data transfer rates
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
21
Storage (6 of 6)
RAID level Description Min number
of drives
needed
Typical application Advantages Disadvantages
RAID 0 Uses a striped disk array
so that data is broken down
into block and each block is
written to a separate disk
drive
2 Video production
and editing
Simple design,
easy to
implement
Not fault-
tolerant
RAID 1 Data written twice to
separate drives
2 Financial Simplest RAID
to implement
Can slow down
system if RAID
controlling
software is used
instead of
hardware
RAID 5 Each data block is written
on a data disk and parity
for blocks in the same rank
is generated and recorded
on a separate disk
3 Database Most versatile
RAID
Can be difficult
to rebuild if a
disk fails
RAID 0+1 A mirrored array with
segments that are RAID 0
arrays
4 Imaging applications High
input/output
rates
Expensive
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
22
Networks
• Redundant networks
• May be necessary due to critical nature of connectivity today
• Wait in the background during normal operations
• Use a replication scheme to keep live network information current
• Launch automatically in the event of a disaster
• Hardware components are duplicated
• Some organizations contract with a second Internet service provider
as a backup
• Software defined networks (SDNs)
• SDN controller can increase network reliability and may lessen the
need for redundant equipment
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
23
Power (1 of 2)
• Maintaining power is essential when planning for redundancy
• Uninterruptible power supply (UPS)
• Maintains power to equipment in the event of an interruption in primary
electrical power source
• Off-line UPS
• Least expensive, simplest solution
• Charged by main power supply
• Begins supplying power quickly when primary power is interrupted
• Switches back to standby mode when primary power is restored
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
24
Power (2 of 2)
• On-line UPS
• Always running off its battery while main power runs battery charger
• Not affected by dips or sags in voltage
• Can serve as a surge protector
• UPS systems can communicate with the network operating system to
ensure orderly shutdown occurs
• But, can only supply power for a limited time
• Backup generator
• Powered by diesel, natural gas, or propane
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
25
Recovery Sites (1 of 3)
• Recovery Sites
• Backup sites may be necessary if flood, hurricane, or other major
disaster damages buildings
• Three types of redundant sites: hot, cold, and warm
• Hot site
• Generally run by a commercial disaster recovery service
• Duplicate of the production site
• Has all needed equipment
• Data backups can be moved quickly to the hot site
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
26
Recovery Sites (2 of 3)
• Cold site
• Provides office space
• Customer must provide and install all equipment needed to continue
operations
• No backups immediately available
• Less expensive than a hot site
• Takes longer to resume full operation
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
27
Recovery Sites (3 of 3)
• Warm site
• All equipment is installed
• No active Internet or telecommunications facilities
• No current data backups
• Less expensive than a hot site
• Time to turn on connections and install backups can be half a day or
more
• A growing trend is to use cloud computing in conjunction with sites
• Back up applications and data to the cloud
• If a disaster occurs, restore it to hardware in a hot, cold, or warm site
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
28
Data (1 of 5)
• Data backup – copying information to a different medium and storing
it at an off-site location
• So that it can be used in the event of a disaster
• Backing up data involves:
• Data backup calculations
• Using different types of data backups
• Off-site backups
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
29
Data (2 of 5)
• Two elements are used in the calculation of when backups should be
performed:
• Recovery point objective (RPO)
• Maximum length of time organization can tolerate between backups
• Recovery time objective (RTO)
• Length of time it will take to recover backed up data
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
30
Data (3 of 5)
• Types of Data Backups
Type of backup How used Archive bit after
backup
Files needed for
recovery
Full backup Starting point for all
backups
Cleared (set to 0) The full backup is
needed
Differential backup Backs up any data that has
changed since last full
backup
Not cleared (set to 1) The full backup and
only last differential
backup are needed
Incremental backup Backs up any data that has
changed since last full
backup or last incremental
backup
Cleared (set to 0) The full backup and all
incremental backups
are needed
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
31
Data (4 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
32
Data (5 of 5)
• Types of Data Backups (continued)
• A more comprehensive backup technology is known as continuous
data protection (CDP)
• Performs continuous backups that can be restored immediately
• Maintains a historical record of all changes made to data
• Creates a snapshot of the data (like a reference marker)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
33
Off-Site Backups (1 of 2)
• 3-2-1 backup plan
• Should always be three different copies of backups on at least two
different types of storage media and one of the backups should be
stored at a different location (off-site backup)
• Most organizations store their off-site backups using an online cloud
repository
• These sites often use CDP to continually backup data
• There are several Internet services that provide similar features to these:
• Automatic continuous backup
• Universal access
• Delayed deletion
• Online or media-based restore
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
34
Off-Site Backups (2 of 2)
• There are legal implications of off-site backups
• The primary issue involves data sovereignty
• Data stored in digital format is subject to the laws of the country
in which the storage facility resides
• Organizations should identify a cloud services provider whose data
center locations ensure that it fully complies with all applicable data
sovereignty laws
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
35
Environmental Controls
• Methods to prevent disruption through environmental controls
• Fire suppression
• Electromagnetic disruption protection
• Proper configuration of HVAC systems
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
36
Fire Suppression (1 of 2)
• Fire suppression includes the attempts to reduce the impact of a fire
• Requirements for a fire to occur
• A type of fuel or combustible material
• Sufficient oxygen to sustain combustion
• Enough heat to raise material to its ignition temperature
• Chemical reaction: fire itself
• In a server closet or room that contains computer equipment
• A stationary fire suppression system is recommended
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
37
Fire Suppression (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
38
Electromagnetic Disruption Protection (1 of 2)
• Electromagnetic interference (EMI)
• Caused by a short-duration burst of energy by the source called an
electromagnetic pulse (EMP)
• Electromagnetic compatibility (EMC)
• Reducing or eliminating the unintentional generation, spread, and
reception of electromagnetic energy
• The goal of EMC is the correct operation of different types of
equipment that function in the same electromagnetic environment
• Faraday cage
• Metal enclosure that prevents entry or escape of electromagnetic fields
• Often used for testing in electronic labs
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
39
Electromagnetic Disruption Protection (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
40
HVAC
• Data centers have special cooling requirements
• More cooling necessary due to large number of systems generating
heat in confined area
• Precise cooling needed
• Heating, ventilating, and air conditioning (HVAC) systems
• Maintain temperature and relative humidity at required levels
• Controlling environmental factors can reduce electrostatic discharge
• Hot aisle/cold aisle layout
• Used to reduce heat by managing air flow
• Servers lined up in alternating rows with cold air intakes facing one
direction and hot air exhausts facing other direction
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
41
Incident Response
• When an unauthorized incident occurs:
• An immediate response is required
• Incident response
• Involves using forensics and following proper incident response
procedures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
42
What is Forensics?
• Forensic Science
• Applying science to legal questions
• Analyzing evidence and can be applied to technology
• Computer forensics
• Uses technology to search for computer evidence of a crime
• Importance of computer forensics is due to the following:
• Amount of digital evidence
• Increased scrutiny by the legal profession
• Higher level of computer skill by criminals
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
43
Incident Response Plan (1 of 2)
• Incident response plan (IRP)
• A set of written instructions for reacting to a security incident
• Incident response process – six action steps to be taken when an
incident occurs:
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
44
Incident Response Plan (2 of 2)
• At a minimum, an IRP should contain the following:
• Documented incident definitions
• Cyber-incident response teams
• Reporting requirements/escalation
• Exercises
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
45
Forensic Procedures
• Five basic steps:
• Secure the crime scene
• Preserve the evidence
• Establish a chain of custody
• Examine the evidence
• Enable recovery
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
46
Secure the Crime Scene (1 of 2)
• When an illegal or unauthorized incident occurs, action must be taken
immediately
• Individuals in the immediate vicinity should perform damage control:
• Report the incident to security or police
• Confront any suspects (if situation allows)
• Neutralize the suspected perpetrator from harming others
• Secure physical security features
• Quarantine electronic equipment
• Contact the cyber-incident response team
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
47
Secure the Crime Scene (2 of 2)
• After the response team arrives, the first job is to secure the crime
scene, which includes:
• Physical surroundings documented
• Photographs taken before anything is touched
• Computer cables labeled
• Team takes custody of entire computer
• Team interviews witnesses
• Length of time passed since the initial incident should be noted
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
48
Preserve the Evidence (1 of 3)
• Preservation of the evidence
• Ensuring that important proof is not destroyed
• Digital evidence is very fragile
• Can be easily altered or destroyed
• One of the first steps is for a legal hold to be issued
• A notification sent from the legal team to employees instructing them
not to delete electronically stored or paper documents relative to the
incident
• Cyber-incident response team captures volatile data
• Examples: contents of RAM, current network connections, logon
sessions, network traffic and logs, any open files
• Order of volatility must be followed to preserve most fragile data first
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
49
Preserve the Evidence (2 of 3)
Location of data Sequence to be retrieved
Register, cache, peripheral memory First
Random access memory (RAM) Second
Network state Third
Running processes Fourth
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
50
Preserve the Evidence (3 of 3)
• Use tools that allow capturing the system image
• A snapshot of the current state of the computer that contains all current
settings and data
• Capture the current image on the screen by taking a screenshot
• Mirror image backup of the hard drive (also called a bit-stream backup)
• Meets evidence standards
• To guarantee accuracy, mirror image backup programs rely upon
hashing algorithms as part of the validation process
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
51
Establish the Chain of Custody
• Chain of custody
• Documents that the evidence was maintained under strict control at all
times
• No unauthorized person was given opportunity to corrupt the evidence
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
52
Examine for Evidence (1 of 3)
• After a computer forensics expert creates a mirror image of a system,
the original system is secured and the mirror image is examined to
reveal evidence
• Includes searching:
• Word documents, email files, spreadsheets, cache and cookies of
the web browser
• Hidden clues also can be exposed by examining
• RAM slack, drive slack, and metadata (data about data)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
53
Examine for Evidence (2 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
54
Examine for Evidence (3 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
55
Enable Recovery
• Strategic intelligence
• The collection, processing, analysis, and dissemination of intelligence
for forming policy changes
• Strategic counterintelligence
• Involves gaining information about the attacker’s intelligence collection
capabilities
• Active logging
• Maintaining active logs regarding the reconnaissance activities
conducted by the attacker
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
56
Chapter Summary (1 of 3)
• Business continuity is an organization’s ability to maintain its operations
after a disruptive event
• In IT contingency planning, an outline of procedures that are to be
followed in the event of a major IT incident is developed
• Disaster recovery
• Focuses on restoring information technology functions
• Disaster recovery plan (DRP) details restoration process
• A server cluster combines two or more servers that are interconnected
to appear as one
• RAID uses multiple hard disk drives for redundancy
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
57
Chapter Summary (2 of 3)
• Network components can be duplicated to provide a redundant network
• Data backup
• Copying information to a different medium and storing (preferably
offsite) for use in event of a disaster
• Recovery point objective and recovery time objective help an
organization determine backup frequency
• Fire suppression systems include water, dry chemical, and clean agent
systems
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
58
Chapter Summary (3 of 3)
• A defense for shielding an electromagnetic field is a Faraday cage
• The control and maintenance of HVAC systems are important for data
centers
• Forensic science is the application of science to questions that are of
interest to the legal profession
• An incident response plan (IRP) is a set of written instructions for
reacting to a security incident
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.

More Related Content

What's hot

Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksChapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksDr. Ahmed Al Zaidy
 
Whitman_Ch10.pptx
Whitman_Ch10.pptxWhitman_Ch10.pptx
Whitman_Ch10.pptxSiphamandla9
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
Whitman_Ch05.pptx
Whitman_Ch05.pptxWhitman_Ch05.pptx
Whitman_Ch05.pptxSiphamandla9
 
Whitman_Ch04.pptx
Whitman_Ch04.pptxWhitman_Ch04.pptx
Whitman_Ch04.pptxSiphamandla9
 
Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptxSiphamandla9
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementDr. Ahmed Al Zaidy
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksDr. Ahmed Al Zaidy
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfHaris Chughtai
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptxSiphamandla9
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IDr. Ahmed Al Zaidy
 
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyCreating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyPositiveTechnologies
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and preventionStephen Hasford
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Simplilearn
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationNetskope
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptxssuserd24233
 

What's hot (20)

Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksChapter 5 Networking and Server Attacks
Chapter 5 Networking and Server Attacks
 
Whitman_Ch10.pptx
Whitman_Ch10.pptxWhitman_Ch10.pptx
Whitman_Ch10.pptx
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Whitman_Ch05.pptx
Whitman_Ch05.pptxWhitman_Ch05.pptx
Whitman_Ch05.pptx
 
Whitman_Ch04.pptx
Whitman_Ch04.pptxWhitman_Ch04.pptx
Whitman_Ch04.pptx
 
Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptx
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
 
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyCreating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Open v ran
Open v ranOpen v ran
Open v ran
 

Similar to Chapter 14 Business Continuity

Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityDr. Ahmed Al Zaidy
 
Whitman_Ch12.pptx
Whitman_Ch12.pptxWhitman_Ch12.pptx
Whitman_Ch12.pptxSiphamandla9
 
Python Fundamentals
Python FundamentalsPython Fundamentals
Python Fundamentalspullaravikumar
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access ManagementDr. Ahmed Al Zaidy
 
9781337102087 ppt ch15
9781337102087 ppt ch159781337102087 ppt ch15
9781337102087 ppt ch15Terry Yoast
 
Coronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptxCoronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptxrmzx1989
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?ONE BCG
 
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Steve Guinan
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationdgdotson
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationdgdotson
 
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningOracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningChris Muir
 
Module 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptxModule 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptxtahreerbassam2014
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practicesiland Cloud
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxAliffDarfriz
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptxNguyenNM
 
V mware software defined storage accelerator service
V mware software defined storage accelerator serviceV mware software defined storage accelerator service
V mware software defined storage accelerator servicesolarisyougood
 
Whitman_Ch11.pptx
Whitman_Ch11.pptxWhitman_Ch11.pptx
Whitman_Ch11.pptxSiphamandla9
 

Similar to Chapter 14 Business Continuity (20)

Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 
Whitman_Ch12.pptx
Whitman_Ch12.pptxWhitman_Ch12.pptx
Whitman_Ch12.pptx
 
Python Fundamentals
Python FundamentalsPython Fundamentals
Python Fundamentals
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
9781337102087 ppt ch15
9781337102087 ppt ch159781337102087 ppt ch15
9781337102087 ppt ch15
 
ch12text.pdf
ch12text.pdfch12text.pdf
ch12text.pdf
 
Coronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptxCoronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptx
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
 
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7
 
chapter-02.pptx
chapter-02.pptxchapter-02.pptx
chapter-02.pptx
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
 
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningOracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & Tuning
 
Module 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptxModule 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptx
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptx
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptx
 
V mware software defined storage accelerator service
V mware software defined storage accelerator serviceV mware software defined storage accelerator service
V mware software defined storage accelerator service
 
Whitman_Ch11.pptx
Whitman_Ch11.pptxWhitman_Ch11.pptx
Whitman_Ch11.pptx
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingDr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web formsDr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesDr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptDr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaDr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web formDr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsDr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webDr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSDr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutDr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSDr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2Dr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (17)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

Chapter 14 Business Continuity

  • 1. 1 CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition Chapter 14 Business Continuity © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. Objectiaves 14.1 Describe the different types of wireless network attacks 14.2 List the vulnerabilities in IEEE 802.11 security 14.3 Explain the solutions for securing a wireless network © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 3. 3 What is Business Continuity? • Business Continuity • An organization’s ability to maintain operations after a disruptive event • Business continuity preparedness involves: • Business continuity planning • Business impact analysis • Disaster recovery planning © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 4. 4 Business Continuity Planning (BCP) • BCP is the process of: • Identifying exposure to threats • Creating preventative and recovery procedures • Testing them to determine if they are sufficient • BCP consists of three essential elements: • Business recovery planning • Crisis management and communications • Disaster recovery © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 5. 5 Business Impact Analysis (BIA) (1 of 2) • BIA - identifies business functions and quantifies the impact a loss of these functions may have on business operations • These range from: • Impact on property (tangible assets) • Impact on finance (monetary funding) • Impact on safety (physical protection) • Impact on reputation (status) • Impact on life (wellbeing) • A BIA will help determine the mission-essential function • Activity that serves as the core purpose of the enterprise © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 6. 6 Business Impact Analysis (BIA) (2 of 2) • A BIA can also help in the identification of critical system • That support the mission-essential function • Identifying a single point of failure • Which is a component or entity in a system which will disable the entire system, should it no longer function • Minimizing these single failure points results in high availability • Many BIAs also contain a privacy impact assessment • Used to identify and mitigate privacy risks • Privacy threshold assessment • Can determine if a system contains personally identifiable information (PII) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 7. 7 Disaster Recovery Plan (DRP) (1 of 5) • Disaster recovery plan (DRP) • Focuses on protecting and restoring information technology functions • Written document detailing process for restoring IT resources: • Following a disruptive event • Comprehensive in scope • Intended to be a detailed document that is updated regularly • Most DRPs: • Have a common set of features • Cover specific topics • Require testing for verification © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 8. 8 Disaster Recovery Plan (DRP) (2 of 5) • Features • Typical outline of a DRP: • Unit 1: Purpose and Scope • Unit 2: Recovery Team • Unit 3: Preparing for a Disaster • Unit 4: Emergency Procedures • Unit 5: Restoration Procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 9. 9 Disaster Recovery Plan (DRP) (3 of 5) • Topics • Sequence in restoring systems (order of restoration) -Which systems should have priority and be restored before other systems? • What should be done if a disaster makes the current location for processing data no longer available -An alternative processing site must be identified -Failback – the process of resynchronizing data back to the primary location © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 10. 10 Disaster Recovery Plan (DRP) (4 of 5) • Testing • Disaster exercises are designed to test the effectiveness of the DRP • Disaster exercise objectives • Test efficiency of interdepartmental planning and coordination in managing a disaster • Test current DRP procedures • Determine response strengths and weaknesses • Tabletop exercises • Simulate an emergency situation but in an informal and stress-free environment • An after-action report should be generated • To analyze the exercise results to identify strengths to be maintained and weaknesses to improve upon © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 11. 11 Disaster Recovery Plan (DRP) (5 of 5) Feature Description Participants Individuals on a decision-making level Focus Training and familiarizing roles, procedures, and responsibilities Setting Informal Format Discussion guided by a facilitator Purpose Identify and solve problems as a group Commitment Only moderate amount of time, cost, and resources Advantage Can acquaint key personnel with emergency responsibilities, procedures, and other members Disadvantage Lack of realism; does not provide a true test © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 12. 12 Fault Tolerance Through Redundancy • Fault tolerance • Refers to a system’s ability to deal with malfunctions • The solution to fault tolerance is to build in redundancy • Which is the use of duplicated equipment to improve the availability of a system • A goal is to reduce a variable known as the mean time to recovery (MTTR) -The average amount of time that it will take a device to recover from a failure that is not a terminal failure • Redundancy planning • Applies to servers, storage, networks, power, sites, and data © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 13. 13 Servers (1 of 3) • Servers • Play a key role in network infrastructure • Failure can have significant business impact • Clustering • Combining two or more devices to appear as a single unit • Server cluster • Multiple servers that appear as a single server • Connected through public and private cluster connections • Types of server clusters • Asymmetric • Symmetric © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 14. 14 Servers (2 of 3) • In an asymmetric server cluster, a standby server performs no function except to be ready if needed • Used for databases, messaging systems, file and print services • All servers do useful work in a symmetric server cluster • If one server fails, remaining servers take on failed server’s work • More cost effective than asymmetric clusters • Used for Web, media, and VPN servers © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 15. 15 Servers (3 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 16. 16 Storage (1 of 6) • Storage - a trend in data storage is to use solid-state drives (SSDs) • SSDs are more resistant to failure and are considered more reliable than traditional HDDs • HDDs are often the first components to fail • Some organizations keep spare hard drives on hand • Mean time between failures (MTBF) • Measures average time until a component fails and must be replaced • Can be used to determine number of spare hard drives an organization should keep © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 17. 17 Storage (2 of 6) • Redundant Array of Independent Devices (RAID) • Uses multiple hard disk drives to increase reliability and performance • Can be implemented through software or hardware • Several levels of RAID exist • RAID Level 0 (striped disk array without fault tolerance) • Striping partitions hard drive into smaller sections • Data written to the stripes is alternated across the drives • If one drive fails, all data on that drive is lost © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 18. 18 Storage (3 of 6) • RAID Level 1 (mirroring) • Disk mirroring used to connect multiple drives to the same disk controller card • Action on primary drive is duplicated on other drive • Primary drive can fail and data will not be lost • Disk duplexing • Variation of RAID Level 1 • Separate cards used for each disk • Protects against controller card failures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 19. 19 Storage (4 of 6) • RAID Level 5 (independent disks with distributed parity) • Distributes parity (error checking) across all drives • Data stored on one drive and its parity information stored on another drive © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 20. 20 Storage (5 of 6) • RAID 0+1 (high data transfer) • Nested-level RAID • Mirrored array whose segments are RAID 0 arrays • Can achieve high data transfer rates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 21. 21 Storage (6 of 6) RAID level Description Min number of drives needed Typical application Advantages Disadvantages RAID 0 Uses a striped disk array so that data is broken down into block and each block is written to a separate disk drive 2 Video production and editing Simple design, easy to implement Not fault- tolerant RAID 1 Data written twice to separate drives 2 Financial Simplest RAID to implement Can slow down system if RAID controlling software is used instead of hardware RAID 5 Each data block is written on a data disk and parity for blocks in the same rank is generated and recorded on a separate disk 3 Database Most versatile RAID Can be difficult to rebuild if a disk fails RAID 0+1 A mirrored array with segments that are RAID 0 arrays 4 Imaging applications High input/output rates Expensive © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 22. 22 Networks • Redundant networks • May be necessary due to critical nature of connectivity today • Wait in the background during normal operations • Use a replication scheme to keep live network information current • Launch automatically in the event of a disaster • Hardware components are duplicated • Some organizations contract with a second Internet service provider as a backup • Software defined networks (SDNs) • SDN controller can increase network reliability and may lessen the need for redundant equipment © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 23. 23 Power (1 of 2) • Maintaining power is essential when planning for redundancy • Uninterruptible power supply (UPS) • Maintains power to equipment in the event of an interruption in primary electrical power source • Off-line UPS • Least expensive, simplest solution • Charged by main power supply • Begins supplying power quickly when primary power is interrupted • Switches back to standby mode when primary power is restored © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 24. 24 Power (2 of 2) • On-line UPS • Always running off its battery while main power runs battery charger • Not affected by dips or sags in voltage • Can serve as a surge protector • UPS systems can communicate with the network operating system to ensure orderly shutdown occurs • But, can only supply power for a limited time • Backup generator • Powered by diesel, natural gas, or propane © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 25. 25 Recovery Sites (1 of 3) • Recovery Sites • Backup sites may be necessary if flood, hurricane, or other major disaster damages buildings • Three types of redundant sites: hot, cold, and warm • Hot site • Generally run by a commercial disaster recovery service • Duplicate of the production site • Has all needed equipment • Data backups can be moved quickly to the hot site © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 26. 26 Recovery Sites (2 of 3) • Cold site • Provides office space • Customer must provide and install all equipment needed to continue operations • No backups immediately available • Less expensive than a hot site • Takes longer to resume full operation © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 27. 27 Recovery Sites (3 of 3) • Warm site • All equipment is installed • No active Internet or telecommunications facilities • No current data backups • Less expensive than a hot site • Time to turn on connections and install backups can be half a day or more • A growing trend is to use cloud computing in conjunction with sites • Back up applications and data to the cloud • If a disaster occurs, restore it to hardware in a hot, cold, or warm site © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 28. 28 Data (1 of 5) • Data backup – copying information to a different medium and storing it at an off-site location • So that it can be used in the event of a disaster • Backing up data involves: • Data backup calculations • Using different types of data backups • Off-site backups © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 29. 29 Data (2 of 5) • Two elements are used in the calculation of when backups should be performed: • Recovery point objective (RPO) • Maximum length of time organization can tolerate between backups • Recovery time objective (RTO) • Length of time it will take to recover backed up data © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 30. 30 Data (3 of 5) • Types of Data Backups Type of backup How used Archive bit after backup Files needed for recovery Full backup Starting point for all backups Cleared (set to 0) The full backup is needed Differential backup Backs up any data that has changed since last full backup Not cleared (set to 1) The full backup and only last differential backup are needed Incremental backup Backs up any data that has changed since last full backup or last incremental backup Cleared (set to 0) The full backup and all incremental backups are needed © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 31. 31 Data (4 of 5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 32. 32 Data (5 of 5) • Types of Data Backups (continued) • A more comprehensive backup technology is known as continuous data protection (CDP) • Performs continuous backups that can be restored immediately • Maintains a historical record of all changes made to data • Creates a snapshot of the data (like a reference marker) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 33. 33 Off-Site Backups (1 of 2) • 3-2-1 backup plan • Should always be three different copies of backups on at least two different types of storage media and one of the backups should be stored at a different location (off-site backup) • Most organizations store their off-site backups using an online cloud repository • These sites often use CDP to continually backup data • There are several Internet services that provide similar features to these: • Automatic continuous backup • Universal access • Delayed deletion • Online or media-based restore © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 34. 34 Off-Site Backups (2 of 2) • There are legal implications of off-site backups • The primary issue involves data sovereignty • Data stored in digital format is subject to the laws of the country in which the storage facility resides • Organizations should identify a cloud services provider whose data center locations ensure that it fully complies with all applicable data sovereignty laws © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 35. 35 Environmental Controls • Methods to prevent disruption through environmental controls • Fire suppression • Electromagnetic disruption protection • Proper configuration of HVAC systems © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 36. 36 Fire Suppression (1 of 2) • Fire suppression includes the attempts to reduce the impact of a fire • Requirements for a fire to occur • A type of fuel or combustible material • Sufficient oxygen to sustain combustion • Enough heat to raise material to its ignition temperature • Chemical reaction: fire itself • In a server closet or room that contains computer equipment • A stationary fire suppression system is recommended © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 37. 37 Fire Suppression (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 38. 38 Electromagnetic Disruption Protection (1 of 2) • Electromagnetic interference (EMI) • Caused by a short-duration burst of energy by the source called an electromagnetic pulse (EMP) • Electromagnetic compatibility (EMC) • Reducing or eliminating the unintentional generation, spread, and reception of electromagnetic energy • The goal of EMC is the correct operation of different types of equipment that function in the same electromagnetic environment • Faraday cage • Metal enclosure that prevents entry or escape of electromagnetic fields • Often used for testing in electronic labs © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 39. 39 Electromagnetic Disruption Protection (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 40. 40 HVAC • Data centers have special cooling requirements • More cooling necessary due to large number of systems generating heat in confined area • Precise cooling needed • Heating, ventilating, and air conditioning (HVAC) systems • Maintain temperature and relative humidity at required levels • Controlling environmental factors can reduce electrostatic discharge • Hot aisle/cold aisle layout • Used to reduce heat by managing air flow • Servers lined up in alternating rows with cold air intakes facing one direction and hot air exhausts facing other direction © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 41. 41 Incident Response • When an unauthorized incident occurs: • An immediate response is required • Incident response • Involves using forensics and following proper incident response procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 42. 42 What is Forensics? • Forensic Science • Applying science to legal questions • Analyzing evidence and can be applied to technology • Computer forensics • Uses technology to search for computer evidence of a crime • Importance of computer forensics is due to the following: • Amount of digital evidence • Increased scrutiny by the legal profession • Higher level of computer skill by criminals © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 43. 43 Incident Response Plan (1 of 2) • Incident response plan (IRP) • A set of written instructions for reacting to a security incident • Incident response process – six action steps to be taken when an incident occurs: • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 44. 44 Incident Response Plan (2 of 2) • At a minimum, an IRP should contain the following: • Documented incident definitions • Cyber-incident response teams • Reporting requirements/escalation • Exercises © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 45. 45 Forensic Procedures • Five basic steps: • Secure the crime scene • Preserve the evidence • Establish a chain of custody • Examine the evidence • Enable recovery © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 46. 46 Secure the Crime Scene (1 of 2) • When an illegal or unauthorized incident occurs, action must be taken immediately • Individuals in the immediate vicinity should perform damage control: • Report the incident to security or police • Confront any suspects (if situation allows) • Neutralize the suspected perpetrator from harming others • Secure physical security features • Quarantine electronic equipment • Contact the cyber-incident response team © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 47. 47 Secure the Crime Scene (2 of 2) • After the response team arrives, the first job is to secure the crime scene, which includes: • Physical surroundings documented • Photographs taken before anything is touched • Computer cables labeled • Team takes custody of entire computer • Team interviews witnesses • Length of time passed since the initial incident should be noted © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 48. 48 Preserve the Evidence (1 of 3) • Preservation of the evidence • Ensuring that important proof is not destroyed • Digital evidence is very fragile • Can be easily altered or destroyed • One of the first steps is for a legal hold to be issued • A notification sent from the legal team to employees instructing them not to delete electronically stored or paper documents relative to the incident • Cyber-incident response team captures volatile data • Examples: contents of RAM, current network connections, logon sessions, network traffic and logs, any open files • Order of volatility must be followed to preserve most fragile data first © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 49. 49 Preserve the Evidence (2 of 3) Location of data Sequence to be retrieved Register, cache, peripheral memory First Random access memory (RAM) Second Network state Third Running processes Fourth © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 50. 50 Preserve the Evidence (3 of 3) • Use tools that allow capturing the system image • A snapshot of the current state of the computer that contains all current settings and data • Capture the current image on the screen by taking a screenshot • Mirror image backup of the hard drive (also called a bit-stream backup) • Meets evidence standards • To guarantee accuracy, mirror image backup programs rely upon hashing algorithms as part of the validation process © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 51. 51 Establish the Chain of Custody • Chain of custody • Documents that the evidence was maintained under strict control at all times • No unauthorized person was given opportunity to corrupt the evidence © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 52. 52 Examine for Evidence (1 of 3) • After a computer forensics expert creates a mirror image of a system, the original system is secured and the mirror image is examined to reveal evidence • Includes searching: • Word documents, email files, spreadsheets, cache and cookies of the web browser • Hidden clues also can be exposed by examining • RAM slack, drive slack, and metadata (data about data) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 53. 53 Examine for Evidence (2 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 54. 54 Examine for Evidence (3 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 55. 55 Enable Recovery • Strategic intelligence • The collection, processing, analysis, and dissemination of intelligence for forming policy changes • Strategic counterintelligence • Involves gaining information about the attacker’s intelligence collection capabilities • Active logging • Maintaining active logs regarding the reconnaissance activities conducted by the attacker © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 56. 56 Chapter Summary (1 of 3) • Business continuity is an organization’s ability to maintain its operations after a disruptive event • In IT contingency planning, an outline of procedures that are to be followed in the event of a major IT incident is developed • Disaster recovery • Focuses on restoring information technology functions • Disaster recovery plan (DRP) details restoration process • A server cluster combines two or more servers that are interconnected to appear as one • RAID uses multiple hard disk drives for redundancy © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 57. 57 Chapter Summary (2 of 3) • Network components can be duplicated to provide a redundant network • Data backup • Copying information to a different medium and storing (preferably offsite) for use in event of a disaster • Recovery point objective and recovery time objective help an organization determine backup frequency • Fire suppression systems include water, dry chemical, and clean agent systems © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 58. 58 Chapter Summary (3 of 3) • A defense for shielding an electromagnetic field is a Faraday cage • The control and maintenance of HVAC systems are important for data centers • Forensic science is the application of science to questions that are of interest to the legal profession • An incident response plan (IRP) is a set of written instructions for reacting to a security incident © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.