Submit Search
Upload
Chapter 14 Business Continuity
•
Download as PPTX, PDF
•
3 likes
•
792 views
Dr. Ahmed Al Zaidy
Follow
CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition
Read less
Read more
Education
Report
Share
Report
Share
1 of 58
Download now
Recommended
Chapter 9 Client and application Security
Chapter 9 Client and application Security
Dr. Ahmed Al Zaidy
Â
Chapter 3 Basic Cryptography
Chapter 3 Basic Cryptography
Dr. Ahmed Al Zaidy
Â
Chapter 1 Introduction to Security
Chapter 1 Introduction to Security
Dr. Ahmed Al Zaidy
Â
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
Dr. Ahmed Al Zaidy
Â
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Dr. Ahmed Al Zaidy
Â
Chapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
Dr. Ahmed Al Zaidy
Â
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
Dr. Ahmed Al Zaidy
Â
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network
Dr. Ahmed Al Zaidy
Â
Recommended
Chapter 9 Client and application Security
Chapter 9 Client and application Security
Dr. Ahmed Al Zaidy
Â
Chapter 3 Basic Cryptography
Chapter 3 Basic Cryptography
Dr. Ahmed Al Zaidy
Â
Chapter 1 Introduction to Security
Chapter 1 Introduction to Security
Dr. Ahmed Al Zaidy
Â
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
Dr. Ahmed Al Zaidy
Â
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Dr. Ahmed Al Zaidy
Â
Chapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
Dr. Ahmed Al Zaidy
Â
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
Dr. Ahmed Al Zaidy
Â
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network
Dr. Ahmed Al Zaidy
Â
Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server Attacks
Dr. Ahmed Al Zaidy
Â
Whitman_Ch10.pptx
Whitman_Ch10.pptx
Siphamandla9
Â
Chapter 7 Presentation
Chapter 7 Presentation
Amy McMullin
Â
Chapter 4
Chapter 4
Amy McMullin
Â
Whitman_Ch05.pptx
Whitman_Ch05.pptx
Siphamandla9
Â
Whitman_Ch04.pptx
Whitman_Ch04.pptx
Siphamandla9
Â
Whitman_Ch06.pptx
Whitman_Ch06.pptx
Siphamandla9
Â
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
Dr. Ahmed Al Zaidy
Â
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
Dr. Ahmed Al Zaidy
Â
Chapter 2 Presentation
Chapter 2 Presentation
Amy McMullin
Â
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
Haris Chughtai
Â
Whitman_Ch02.pptx
Whitman_Ch02.pptx
Siphamandla9
Â
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Dr. Ahmed Al Zaidy
Â
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
PositiveTechnologies
Â
Phishing and prevention
Phishing and prevention
Stephen Hasford
Â
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
Â
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Netskope
Â
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
Â
Network security model.pptx
Network security model.pptx
ssuserd24233
Â
Open v ran
Open v ran
Rajasa Pramudya Wardhana
Â
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
Dr. Ahmed Al Zaidy
Â
Whitman_Ch12.pptx
Whitman_Ch12.pptx
Siphamandla9
Â
More Related Content
What's hot
Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server Attacks
Dr. Ahmed Al Zaidy
Â
Whitman_Ch10.pptx
Whitman_Ch10.pptx
Siphamandla9
Â
Chapter 7 Presentation
Chapter 7 Presentation
Amy McMullin
Â
Chapter 4
Chapter 4
Amy McMullin
Â
Whitman_Ch05.pptx
Whitman_Ch05.pptx
Siphamandla9
Â
Whitman_Ch04.pptx
Whitman_Ch04.pptx
Siphamandla9
Â
Whitman_Ch06.pptx
Whitman_Ch06.pptx
Siphamandla9
Â
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
Dr. Ahmed Al Zaidy
Â
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
Dr. Ahmed Al Zaidy
Â
Chapter 2 Presentation
Chapter 2 Presentation
Amy McMullin
Â
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
Haris Chughtai
Â
Whitman_Ch02.pptx
Whitman_Ch02.pptx
Siphamandla9
Â
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Dr. Ahmed Al Zaidy
Â
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
PositiveTechnologies
Â
Phishing and prevention
Phishing and prevention
Stephen Hasford
Â
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
Â
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Netskope
Â
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
Â
Network security model.pptx
Network security model.pptx
ssuserd24233
Â
Open v ran
Open v ran
Rajasa Pramudya Wardhana
Â
What's hot
(20)
Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server Attacks
Â
Whitman_Ch10.pptx
Whitman_Ch10.pptx
Â
Chapter 7 Presentation
Chapter 7 Presentation
Â
Chapter 4
Chapter 4
Â
Whitman_Ch05.pptx
Whitman_Ch05.pptx
Â
Whitman_Ch04.pptx
Whitman_Ch04.pptx
Â
Whitman_Ch06.pptx
Whitman_Ch06.pptx
Â
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
Â
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
Â
Chapter 2 Presentation
Chapter 2 Presentation
Â
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
Â
Whitman_Ch02.pptx
Whitman_Ch02.pptx
Â
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Â
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
Â
Phishing and prevention
Phishing and prevention
Â
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Â
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Â
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Â
Network security model.pptx
Network security model.pptx
Â
Open v ran
Open v ran
Â
Similar to Chapter 14 Business Continuity
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
Dr. Ahmed Al Zaidy
Â
Whitman_Ch12.pptx
Whitman_Ch12.pptx
Siphamandla9
Â
Python Fundamentals
Python Fundamentals
pullaravikumar
Â
Chapter 12 Access Management
Chapter 12 Access Management
Dr. Ahmed Al Zaidy
Â
9781337102087 ppt ch15
9781337102087 ppt ch15
Terry Yoast
Â
ch12text.pdf
ch12text.pdf
HashimAli631806
Â
Coronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptx
rmzx1989
Â
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
ONE BCG
Â
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7
Steve Guinan
Â
chapter-02.pptx
chapter-02.pptx
YantiAndriyani3
Â
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
dgdotson
Â
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
dgdotson
Â
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & Tuning
Chris Muir
Â
Module 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptx
tahreerbassam2014
Â
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
iland Cloud
Â
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptx
AliffDarfriz
Â
Chapter 13
Chapter 13
Amy McMullin
Â
093049ov10.pptx
093049ov10.pptx
NguyenNM
Â
V mware software defined storage accelerator service
V mware software defined storage accelerator service
solarisyougood
Â
Whitman_Ch11.pptx
Whitman_Ch11.pptx
Siphamandla9
Â
Similar to Chapter 14 Business Continuity
(20)
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
Â
Whitman_Ch12.pptx
Whitman_Ch12.pptx
Â
Python Fundamentals
Python Fundamentals
Â
Chapter 12 Access Management
Chapter 12 Access Management
Â
9781337102087 ppt ch15
9781337102087 ppt ch15
Â
ch12text.pdf
ch12text.pdf
Â
Coronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptx
Â
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
Â
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7
Â
chapter-02.pptx
chapter-02.pptx
Â
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
Â
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
Â
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & Tuning
Â
Module 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptx
Â
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
Â
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptx
Â
Chapter 13
Chapter 13
Â
093049ov10.pptx
093049ov10.pptx
Â
V mware software defined storage accelerator service
V mware software defined storage accelerator service
Â
Whitman_Ch11.pptx
Whitman_Ch11.pptx
Â
More from Dr. Ahmed Al Zaidy
Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
Dr. Ahmed Al Zaidy
Â
Chapter 13 Programming for web forms
Chapter 13 Programming for web forms
Dr. Ahmed Al Zaidy
Â
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
Dr. Ahmed Al Zaidy
Â
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
Dr. Ahmed Al Zaidy
Â
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
Dr. Ahmed Al Zaidy
Â
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
Dr. Ahmed Al Zaidy
Â
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
Dr. Ahmed Al Zaidy
Â
Chapter 7 Designing a web form
Chapter 7 Designing a web form
Dr. Ahmed Al Zaidy
Â
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
Dr. Ahmed Al Zaidy
Â
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
Dr. Ahmed Al Zaidy
Â
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
Dr. Ahmed Al Zaidy
Â
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
Dr. Ahmed Al Zaidy
Â
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
Dr. Ahmed Al Zaidy
Â
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
Dr. Ahmed Al Zaidy
Â
Integer overflows
Integer overflows
Dr. Ahmed Al Zaidy
Â
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
Dr. Ahmed Al Zaidy
Â
Fundamental of testing
Fundamental of testing
Dr. Ahmed Al Zaidy
Â
More from Dr. Ahmed Al Zaidy
(17)
Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
Â
Chapter 13 Programming for web forms
Chapter 13 Programming for web forms
Â
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
Â
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
Â
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
Â
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
Â
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
Â
Chapter 7 Designing a web form
Chapter 7 Designing a web form
Â
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
Â
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
Â
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
Â
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
Â
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
Â
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
Â
Integer overflows
Integer overflows
Â
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
Â
Fundamental of testing
Fundamental of testing
Â
Recently uploaded
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Mr Bounab Samir
Â
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
JiesonDelaCerna
Â
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Celine George
Â
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
NirmalaLoungPoorunde1
Â
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
CapitolTechU
Â
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
ssuser54595a
Â
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
VS Mahajan Coaching Centre
Â
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
Â
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Celine George
Â
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
arsicmarija21
Â
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Dr. Mazin Mohamed alkathiri
Â
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
manuelaromero2013
Â
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Sumit Tiwari
Â
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
SamikshaHamane
Â
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Sayali Powar
Â
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
UjwalaBharambe
Â
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
JonathanParaisoCruz
Â
Recently uploaded
(20)
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Â
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Â
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Â
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Â
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Â
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
Â
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
Â
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Â
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Â
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Â
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Â
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
Â
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
Â
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Â
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Â
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Â
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Â
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Â
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Â
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
Â
Chapter 14 Business Continuity
1.
1 CompTIA Security+ Guide
to Network Security Fundamentals, Sixth Edition Chapter 14 Business Continuity © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
2.
Objectiaves 14.1 Describe the
different types of wireless network attacks 14.2 List the vulnerabilities in IEEE 802.11 security 14.3 Explain the solutions for securing a wireless network © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
3.
3 What is Business
Continuity? • Business Continuity • An organization’s ability to maintain operations after a disruptive event • Business continuity preparedness involves: • Business continuity planning • Business impact analysis • Disaster recovery planning © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
4.
4 Business Continuity Planning
(BCP) • BCP is the process of: • Identifying exposure to threats • Creating preventative and recovery procedures • Testing them to determine if they are sufficient • BCP consists of three essential elements: • Business recovery planning • Crisis management and communications • Disaster recovery © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
5.
5 Business Impact Analysis
(BIA) (1 of 2) • BIA - identifies business functions and quantifies the impact a loss of these functions may have on business operations • These range from: • Impact on property (tangible assets) • Impact on finance (monetary funding) • Impact on safety (physical protection) • Impact on reputation (status) • Impact on life (wellbeing) • A BIA will help determine the mission-essential function • Activity that serves as the core purpose of the enterprise © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
6.
6 Business Impact Analysis
(BIA) (2 of 2) • A BIA can also help in the identification of critical system • That support the mission-essential function • Identifying a single point of failure • Which is a component or entity in a system which will disable the entire system, should it no longer function • Minimizing these single failure points results in high availability • Many BIAs also contain a privacy impact assessment • Used to identify and mitigate privacy risks • Privacy threshold assessment • Can determine if a system contains personally identifiable information (PII) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
7.
7 Disaster Recovery Plan
(DRP) (1 of 5) • Disaster recovery plan (DRP) • Focuses on protecting and restoring information technology functions • Written document detailing process for restoring IT resources: • Following a disruptive event • Comprehensive in scope • Intended to be a detailed document that is updated regularly • Most DRPs: • Have a common set of features • Cover specific topics • Require testing for verification © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
8.
8 Disaster Recovery Plan
(DRP) (2 of 5) • Features • Typical outline of a DRP: • Unit 1: Purpose and Scope • Unit 2: Recovery Team • Unit 3: Preparing for a Disaster • Unit 4: Emergency Procedures • Unit 5: Restoration Procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
9.
9 Disaster Recovery Plan
(DRP) (3 of 5) • Topics • Sequence in restoring systems (order of restoration) -Which systems should have priority and be restored before other systems? • What should be done if a disaster makes the current location for processing data no longer available -An alternative processing site must be identified -Failback – the process of resynchronizing data back to the primary location © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
10.
10 Disaster Recovery Plan
(DRP) (4 of 5) • Testing • Disaster exercises are designed to test the effectiveness of the DRP • Disaster exercise objectives • Test efficiency of interdepartmental planning and coordination in managing a disaster • Test current DRP procedures • Determine response strengths and weaknesses • Tabletop exercises • Simulate an emergency situation but in an informal and stress-free environment • An after-action report should be generated • To analyze the exercise results to identify strengths to be maintained and weaknesses to improve upon © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
11.
11 Disaster Recovery Plan
(DRP) (5 of 5) Feature Description Participants Individuals on a decision-making level Focus Training and familiarizing roles, procedures, and responsibilities Setting Informal Format Discussion guided by a facilitator Purpose Identify and solve problems as a group Commitment Only moderate amount of time, cost, and resources Advantage Can acquaint key personnel with emergency responsibilities, procedures, and other members Disadvantage Lack of realism; does not provide a true test © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
12.
12 Fault Tolerance Through
Redundancy • Fault tolerance • Refers to a system’s ability to deal with malfunctions • The solution to fault tolerance is to build in redundancy • Which is the use of duplicated equipment to improve the availability of a system • A goal is to reduce a variable known as the mean time to recovery (MTTR) -The average amount of time that it will take a device to recover from a failure that is not a terminal failure • Redundancy planning • Applies to servers, storage, networks, power, sites, and data © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
13.
13 Servers (1 of
3) • Servers • Play a key role in network infrastructure • Failure can have significant business impact • Clustering • Combining two or more devices to appear as a single unit • Server cluster • Multiple servers that appear as a single server • Connected through public and private cluster connections • Types of server clusters • Asymmetric • Symmetric © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
14.
14 Servers (2 of
3) • In an asymmetric server cluster, a standby server performs no function except to be ready if needed • Used for databases, messaging systems, file and print services • All servers do useful work in a symmetric server cluster • If one server fails, remaining servers take on failed server’s work • More cost effective than asymmetric clusters • Used for Web, media, and VPN servers © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
15.
15 Servers (3 of
3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
16.
16 Storage (1 of
6) • Storage - a trend in data storage is to use solid-state drives (SSDs) • SSDs are more resistant to failure and are considered more reliable than traditional HDDs • HDDs are often the first components to fail • Some organizations keep spare hard drives on hand • Mean time between failures (MTBF) • Measures average time until a component fails and must be replaced • Can be used to determine number of spare hard drives an organization should keep © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
17.
17 Storage (2 of
6) • Redundant Array of Independent Devices (RAID) • Uses multiple hard disk drives to increase reliability and performance • Can be implemented through software or hardware • Several levels of RAID exist • RAID Level 0 (striped disk array without fault tolerance) • Striping partitions hard drive into smaller sections • Data written to the stripes is alternated across the drives • If one drive fails, all data on that drive is lost © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
18.
18 Storage (3 of
6) • RAID Level 1 (mirroring) • Disk mirroring used to connect multiple drives to the same disk controller card • Action on primary drive is duplicated on other drive • Primary drive can fail and data will not be lost • Disk duplexing • Variation of RAID Level 1 • Separate cards used for each disk • Protects against controller card failures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
19.
19 Storage (4 of
6) • RAID Level 5 (independent disks with distributed parity) • Distributes parity (error checking) across all drives • Data stored on one drive and its parity information stored on another drive © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
20.
20 Storage (5 of
6) • RAID 0+1 (high data transfer) • Nested-level RAID • Mirrored array whose segments are RAID 0 arrays • Can achieve high data transfer rates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
21.
21 Storage (6 of
6) RAID level Description Min number of drives needed Typical application Advantages Disadvantages RAID 0 Uses a striped disk array so that data is broken down into block and each block is written to a separate disk drive 2 Video production and editing Simple design, easy to implement Not fault- tolerant RAID 1 Data written twice to separate drives 2 Financial Simplest RAID to implement Can slow down system if RAID controlling software is used instead of hardware RAID 5 Each data block is written on a data disk and parity for blocks in the same rank is generated and recorded on a separate disk 3 Database Most versatile RAID Can be difficult to rebuild if a disk fails RAID 0+1 A mirrored array with segments that are RAID 0 arrays 4 Imaging applications High input/output rates Expensive © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
22.
22 Networks • Redundant networks •
May be necessary due to critical nature of connectivity today • Wait in the background during normal operations • Use a replication scheme to keep live network information current • Launch automatically in the event of a disaster • Hardware components are duplicated • Some organizations contract with a second Internet service provider as a backup • Software defined networks (SDNs) • SDN controller can increase network reliability and may lessen the need for redundant equipment © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
23.
23 Power (1 of
2) • Maintaining power is essential when planning for redundancy • Uninterruptible power supply (UPS) • Maintains power to equipment in the event of an interruption in primary electrical power source • Off-line UPS • Least expensive, simplest solution • Charged by main power supply • Begins supplying power quickly when primary power is interrupted • Switches back to standby mode when primary power is restored © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
24.
24 Power (2 of
2) • On-line UPS • Always running off its battery while main power runs battery charger • Not affected by dips or sags in voltage • Can serve as a surge protector • UPS systems can communicate with the network operating system to ensure orderly shutdown occurs • But, can only supply power for a limited time • Backup generator • Powered by diesel, natural gas, or propane © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
25.
25 Recovery Sites (1
of 3) • Recovery Sites • Backup sites may be necessary if flood, hurricane, or other major disaster damages buildings • Three types of redundant sites: hot, cold, and warm • Hot site • Generally run by a commercial disaster recovery service • Duplicate of the production site • Has all needed equipment • Data backups can be moved quickly to the hot site © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
26.
26 Recovery Sites (2
of 3) • Cold site • Provides office space • Customer must provide and install all equipment needed to continue operations • No backups immediately available • Less expensive than a hot site • Takes longer to resume full operation © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
27.
27 Recovery Sites (3
of 3) • Warm site • All equipment is installed • No active Internet or telecommunications facilities • No current data backups • Less expensive than a hot site • Time to turn on connections and install backups can be half a day or more • A growing trend is to use cloud computing in conjunction with sites • Back up applications and data to the cloud • If a disaster occurs, restore it to hardware in a hot, cold, or warm site © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
28.
28 Data (1 of
5) • Data backup – copying information to a different medium and storing it at an off-site location • So that it can be used in the event of a disaster • Backing up data involves: • Data backup calculations • Using different types of data backups • Off-site backups © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
29.
29 Data (2 of
5) • Two elements are used in the calculation of when backups should be performed: • Recovery point objective (RPO) • Maximum length of time organization can tolerate between backups • Recovery time objective (RTO) • Length of time it will take to recover backed up data © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
30.
30 Data (3 of
5) • Types of Data Backups Type of backup How used Archive bit after backup Files needed for recovery Full backup Starting point for all backups Cleared (set to 0) The full backup is needed Differential backup Backs up any data that has changed since last full backup Not cleared (set to 1) The full backup and only last differential backup are needed Incremental backup Backs up any data that has changed since last full backup or last incremental backup Cleared (set to 0) The full backup and all incremental backups are needed © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
31.
31 Data (4 of
5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
32.
32 Data (5 of
5) • Types of Data Backups (continued) • A more comprehensive backup technology is known as continuous data protection (CDP) • Performs continuous backups that can be restored immediately • Maintains a historical record of all changes made to data • Creates a snapshot of the data (like a reference marker) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
33.
33 Off-Site Backups (1
of 2) • 3-2-1 backup plan • Should always be three different copies of backups on at least two different types of storage media and one of the backups should be stored at a different location (off-site backup) • Most organizations store their off-site backups using an online cloud repository • These sites often use CDP to continually backup data • There are several Internet services that provide similar features to these: • Automatic continuous backup • Universal access • Delayed deletion • Online or media-based restore © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
34.
34 Off-Site Backups (2
of 2) • There are legal implications of off-site backups • The primary issue involves data sovereignty • Data stored in digital format is subject to the laws of the country in which the storage facility resides • Organizations should identify a cloud services provider whose data center locations ensure that it fully complies with all applicable data sovereignty laws © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
35.
35 Environmental Controls • Methods
to prevent disruption through environmental controls • Fire suppression • Electromagnetic disruption protection • Proper configuration of HVAC systems © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
36.
36 Fire Suppression (1
of 2) • Fire suppression includes the attempts to reduce the impact of a fire • Requirements for a fire to occur • A type of fuel or combustible material • Sufficient oxygen to sustain combustion • Enough heat to raise material to its ignition temperature • Chemical reaction: fire itself • In a server closet or room that contains computer equipment • A stationary fire suppression system is recommended © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
37.
37 Fire Suppression (2
of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
38.
38 Electromagnetic Disruption Protection
(1 of 2) • Electromagnetic interference (EMI) • Caused by a short-duration burst of energy by the source called an electromagnetic pulse (EMP) • Electromagnetic compatibility (EMC) • Reducing or eliminating the unintentional generation, spread, and reception of electromagnetic energy • The goal of EMC is the correct operation of different types of equipment that function in the same electromagnetic environment • Faraday cage • Metal enclosure that prevents entry or escape of electromagnetic fields • Often used for testing in electronic labs © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
39.
39 Electromagnetic Disruption Protection
(2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
40.
40 HVAC • Data centers
have special cooling requirements • More cooling necessary due to large number of systems generating heat in confined area • Precise cooling needed • Heating, ventilating, and air conditioning (HVAC) systems • Maintain temperature and relative humidity at required levels • Controlling environmental factors can reduce electrostatic discharge • Hot aisle/cold aisle layout • Used to reduce heat by managing air flow • Servers lined up in alternating rows with cold air intakes facing one direction and hot air exhausts facing other direction © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
41.
41 Incident Response • When
an unauthorized incident occurs: • An immediate response is required • Incident response • Involves using forensics and following proper incident response procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
42.
42 What is Forensics? •
Forensic Science • Applying science to legal questions • Analyzing evidence and can be applied to technology • Computer forensics • Uses technology to search for computer evidence of a crime • Importance of computer forensics is due to the following: • Amount of digital evidence • Increased scrutiny by the legal profession • Higher level of computer skill by criminals © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
43.
43 Incident Response Plan
(1 of 2) • Incident response plan (IRP) • A set of written instructions for reacting to a security incident • Incident response process – six action steps to be taken when an incident occurs: • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
44.
44 Incident Response Plan
(2 of 2) • At a minimum, an IRP should contain the following: • Documented incident definitions • Cyber-incident response teams • Reporting requirements/escalation • Exercises © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
45.
45 Forensic Procedures • Five
basic steps: • Secure the crime scene • Preserve the evidence • Establish a chain of custody • Examine the evidence • Enable recovery © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
46.
46 Secure the Crime
Scene (1 of 2) • When an illegal or unauthorized incident occurs, action must be taken immediately • Individuals in the immediate vicinity should perform damage control: • Report the incident to security or police • Confront any suspects (if situation allows) • Neutralize the suspected perpetrator from harming others • Secure physical security features • Quarantine electronic equipment • Contact the cyber-incident response team © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
47.
47 Secure the Crime
Scene (2 of 2) • After the response team arrives, the first job is to secure the crime scene, which includes: • Physical surroundings documented • Photographs taken before anything is touched • Computer cables labeled • Team takes custody of entire computer • Team interviews witnesses • Length of time passed since the initial incident should be noted © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
48.
48 Preserve the Evidence
(1 of 3) • Preservation of the evidence • Ensuring that important proof is not destroyed • Digital evidence is very fragile • Can be easily altered or destroyed • One of the first steps is for a legal hold to be issued • A notification sent from the legal team to employees instructing them not to delete electronically stored or paper documents relative to the incident • Cyber-incident response team captures volatile data • Examples: contents of RAM, current network connections, logon sessions, network traffic and logs, any open files • Order of volatility must be followed to preserve most fragile data first © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
49.
49 Preserve the Evidence
(2 of 3) Location of data Sequence to be retrieved Register, cache, peripheral memory First Random access memory (RAM) Second Network state Third Running processes Fourth © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
50.
50 Preserve the Evidence
(3 of 3) • Use tools that allow capturing the system image • A snapshot of the current state of the computer that contains all current settings and data • Capture the current image on the screen by taking a screenshot • Mirror image backup of the hard drive (also called a bit-stream backup) • Meets evidence standards • To guarantee accuracy, mirror image backup programs rely upon hashing algorithms as part of the validation process © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
51.
51 Establish the Chain
of Custody • Chain of custody • Documents that the evidence was maintained under strict control at all times • No unauthorized person was given opportunity to corrupt the evidence © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
52.
52 Examine for Evidence
(1 of 3) • After a computer forensics expert creates a mirror image of a system, the original system is secured and the mirror image is examined to reveal evidence • Includes searching: • Word documents, email files, spreadsheets, cache and cookies of the web browser • Hidden clues also can be exposed by examining • RAM slack, drive slack, and metadata (data about data) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
53.
53 Examine for Evidence
(2 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
54.
54 Examine for Evidence
(3 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
55.
55 Enable Recovery • Strategic
intelligence • The collection, processing, analysis, and dissemination of intelligence for forming policy changes • Strategic counterintelligence • Involves gaining information about the attacker’s intelligence collection capabilities • Active logging • Maintaining active logs regarding the reconnaissance activities conducted by the attacker © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
56.
56 Chapter Summary (1
of 3) • Business continuity is an organization’s ability to maintain its operations after a disruptive event • In IT contingency planning, an outline of procedures that are to be followed in the event of a major IT incident is developed • Disaster recovery • Focuses on restoring information technology functions • Disaster recovery plan (DRP) details restoration process • A server cluster combines two or more servers that are interconnected to appear as one • RAID uses multiple hard disk drives for redundancy © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
57.
57 Chapter Summary (2
of 3) • Network components can be duplicated to provide a redundant network • Data backup • Copying information to a different medium and storing (preferably offsite) for use in event of a disaster • Recovery point objective and recovery time objective help an organization determine backup frequency • Fire suppression systems include water, dry chemical, and clean agent systems © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
58.
58 Chapter Summary (3
of 3) • A defense for shielding an electromagnetic field is a Faraday cage • The control and maintenance of HVAC systems are important for data centers • Forensic science is the application of science to questions that are of interest to the legal profession • An incident response plan (IRP) is a set of written instructions for reacting to a security incident © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Download now