SlideShare a Scribd company logo
1
CompTIA Security+ Guide to Network
Security Fundamentals, Sixth Edition
Chapter 14
Business Continuity
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Objectiaves
14.1 Describe the different types of wireless
network attacks
14.2 List the vulnerabilities in IEEE 802.11
security
14.3 Explain the solutions for securing a wireless
network
© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
3
What is Business Continuity?
• Business Continuity
• An organization’s ability to maintain operations after a disruptive event
• Business continuity preparedness involves:
• Business continuity planning
• Business impact analysis
• Disaster recovery planning
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
4
Business Continuity Planning (BCP)
• BCP is the process of:
• Identifying exposure to threats
• Creating preventative and recovery procedures
• Testing them to determine if they are sufficient
• BCP consists of three essential elements:
• Business recovery planning
• Crisis management and communications
• Disaster recovery
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
5
Business Impact Analysis (BIA) (1 of 2)
• BIA - identifies business functions and quantifies the impact a loss of
these functions may have on business operations
• These range from:
• Impact on property (tangible assets)
• Impact on finance (monetary funding)
• Impact on safety (physical protection)
• Impact on reputation (status)
• Impact on life (wellbeing)
• A BIA will help determine the mission-essential function
• Activity that serves as the core purpose of the enterprise
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
6
Business Impact Analysis (BIA) (2 of 2)
• A BIA can also help in the identification of critical system
• That support the mission-essential function
• Identifying a single point of failure
• Which is a component or entity in a system which will disable the entire
system, should it no longer function
• Minimizing these single failure points results in high availability
• Many BIAs also contain a privacy impact assessment
• Used to identify and mitigate privacy risks
• Privacy threshold assessment
• Can determine if a system contains personally identifiable information
(PII)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
7
Disaster Recovery Plan (DRP) (1 of 5)
• Disaster recovery plan (DRP)
• Focuses on protecting and restoring information technology functions
• Written document detailing process for restoring IT resources:
• Following a disruptive event
• Comprehensive in scope
• Intended to be a detailed document that is updated regularly
• Most DRPs:
• Have a common set of features
• Cover specific topics
• Require testing for verification
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
8
Disaster Recovery Plan (DRP) (2 of 5)
• Features
• Typical outline of a DRP:
• Unit 1: Purpose and Scope
• Unit 2: Recovery Team
• Unit 3: Preparing for a Disaster
• Unit 4: Emergency Procedures
• Unit 5: Restoration Procedures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
9
Disaster Recovery Plan (DRP) (3 of 5)
• Topics
• Sequence in restoring systems (order of restoration)
-Which systems should have priority and be restored before other
systems?
• What should be done if a disaster makes the current location for
processing data no longer available
-An alternative processing site must be identified
-Failback – the process of resynchronizing data back to the primary
location
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
10
Disaster Recovery Plan (DRP) (4 of 5)
• Testing
• Disaster exercises are designed to test the effectiveness of the DRP
• Disaster exercise objectives
• Test efficiency of interdepartmental planning and coordination in
managing a disaster
• Test current DRP procedures
• Determine response strengths and weaknesses
• Tabletop exercises
• Simulate an emergency situation but in an informal and stress-free
environment
• An after-action report should be generated
• To analyze the exercise results to identify strengths to be maintained
and weaknesses to improve upon
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
11
Disaster Recovery Plan (DRP) (5 of 5)
Feature Description
Participants Individuals on a decision-making level
Focus Training and familiarizing roles, procedures, and
responsibilities
Setting Informal
Format Discussion guided by a facilitator
Purpose Identify and solve problems as a group
Commitment Only moderate amount of time, cost, and resources
Advantage Can acquaint key personnel with emergency
responsibilities, procedures, and other members
Disadvantage Lack of realism; does not provide a true test
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
12
Fault Tolerance Through Redundancy
• Fault tolerance
• Refers to a system’s ability to deal with malfunctions
• The solution to fault tolerance is to build in redundancy
• Which is the use of duplicated equipment to improve the availability
of a system
• A goal is to reduce a variable known as the mean time to recovery
(MTTR)
-The average amount of time that it will take a device to recover
from a failure that is not a terminal failure
• Redundancy planning
• Applies to servers, storage, networks, power, sites, and data
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
13
Servers (1 of 3)
• Servers
• Play a key role in network infrastructure
• Failure can have significant business impact
• Clustering
• Combining two or more devices to appear as a single unit
• Server cluster
• Multiple servers that appear as a single server
• Connected through public and private cluster connections
• Types of server clusters
• Asymmetric
• Symmetric
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
14
Servers (2 of 3)
• In an asymmetric server cluster, a standby server performs no function
except to be ready if needed
• Used for databases, messaging systems, file and print services
• All servers do useful work in a symmetric server cluster
• If one server fails, remaining servers take on failed server’s work
• More cost effective than asymmetric clusters
• Used for Web, media, and VPN servers
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
15
Servers (3 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
16
Storage (1 of 6)
• Storage - a trend in data storage is to use solid-state drives (SSDs)
• SSDs are more resistant to failure and are considered more reliable
than traditional HDDs
• HDDs are often the first components to fail
• Some organizations keep spare hard drives on hand
• Mean time between failures (MTBF)
• Measures average time until a component fails and must be replaced
• Can be used to determine number of spare hard drives an organization
should keep
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
17
Storage (2 of 6)
• Redundant Array of Independent Devices (RAID)
• Uses multiple hard disk drives to increase reliability and performance
• Can be implemented through software or hardware
• Several levels of RAID exist
• RAID Level 0 (striped disk array without fault tolerance)
• Striping partitions hard drive into smaller sections
• Data written to the stripes is alternated across the drives
• If one drive fails, all data on that drive is lost
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
18
Storage (3 of 6)
• RAID Level 1 (mirroring)
• Disk mirroring used to connect multiple
drives to the same disk controller card
• Action on primary drive is duplicated on
other drive
• Primary drive can fail and data will not
be lost
• Disk duplexing
• Variation of RAID Level 1
• Separate cards used for each disk
• Protects against controller card failures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
19
Storage (4 of 6)
• RAID Level 5 (independent disks with distributed parity)
• Distributes parity (error checking) across all drives
• Data stored on one drive and its parity information stored on
another drive
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
20
Storage (5 of 6)
• RAID 0+1 (high data transfer)
• Nested-level RAID
• Mirrored array whose segments are RAID 0 arrays
• Can achieve high data transfer rates
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
21
Storage (6 of 6)
RAID level Description Min number
of drives
needed
Typical application Advantages Disadvantages
RAID 0 Uses a striped disk array
so that data is broken down
into block and each block is
written to a separate disk
drive
2 Video production
and editing
Simple design,
easy to
implement
Not fault-
tolerant
RAID 1 Data written twice to
separate drives
2 Financial Simplest RAID
to implement
Can slow down
system if RAID
controlling
software is used
instead of
hardware
RAID 5 Each data block is written
on a data disk and parity
for blocks in the same rank
is generated and recorded
on a separate disk
3 Database Most versatile
RAID
Can be difficult
to rebuild if a
disk fails
RAID 0+1 A mirrored array with
segments that are RAID 0
arrays
4 Imaging applications High
input/output
rates
Expensive
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
22
Networks
• Redundant networks
• May be necessary due to critical nature of connectivity today
• Wait in the background during normal operations
• Use a replication scheme to keep live network information current
• Launch automatically in the event of a disaster
• Hardware components are duplicated
• Some organizations contract with a second Internet service provider
as a backup
• Software defined networks (SDNs)
• SDN controller can increase network reliability and may lessen the
need for redundant equipment
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
23
Power (1 of 2)
• Maintaining power is essential when planning for redundancy
• Uninterruptible power supply (UPS)
• Maintains power to equipment in the event of an interruption in primary
electrical power source
• Off-line UPS
• Least expensive, simplest solution
• Charged by main power supply
• Begins supplying power quickly when primary power is interrupted
• Switches back to standby mode when primary power is restored
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
24
Power (2 of 2)
• On-line UPS
• Always running off its battery while main power runs battery charger
• Not affected by dips or sags in voltage
• Can serve as a surge protector
• UPS systems can communicate with the network operating system to
ensure orderly shutdown occurs
• But, can only supply power for a limited time
• Backup generator
• Powered by diesel, natural gas, or propane
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
25
Recovery Sites (1 of 3)
• Recovery Sites
• Backup sites may be necessary if flood, hurricane, or other major
disaster damages buildings
• Three types of redundant sites: hot, cold, and warm
• Hot site
• Generally run by a commercial disaster recovery service
• Duplicate of the production site
• Has all needed equipment
• Data backups can be moved quickly to the hot site
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
26
Recovery Sites (2 of 3)
• Cold site
• Provides office space
• Customer must provide and install all equipment needed to continue
operations
• No backups immediately available
• Less expensive than a hot site
• Takes longer to resume full operation
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
27
Recovery Sites (3 of 3)
• Warm site
• All equipment is installed
• No active Internet or telecommunications facilities
• No current data backups
• Less expensive than a hot site
• Time to turn on connections and install backups can be half a day or
more
• A growing trend is to use cloud computing in conjunction with sites
• Back up applications and data to the cloud
• If a disaster occurs, restore it to hardware in a hot, cold, or warm site
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
28
Data (1 of 5)
• Data backup – copying information to a different medium and storing
it at an off-site location
• So that it can be used in the event of a disaster
• Backing up data involves:
• Data backup calculations
• Using different types of data backups
• Off-site backups
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
29
Data (2 of 5)
• Two elements are used in the calculation of when backups should be
performed:
• Recovery point objective (RPO)
• Maximum length of time organization can tolerate between backups
• Recovery time objective (RTO)
• Length of time it will take to recover backed up data
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
30
Data (3 of 5)
• Types of Data Backups
Type of backup How used Archive bit after
backup
Files needed for
recovery
Full backup Starting point for all
backups
Cleared (set to 0) The full backup is
needed
Differential backup Backs up any data that has
changed since last full
backup
Not cleared (set to 1) The full backup and
only last differential
backup are needed
Incremental backup Backs up any data that has
changed since last full
backup or last incremental
backup
Cleared (set to 0) The full backup and all
incremental backups
are needed
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
31
Data (4 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
32
Data (5 of 5)
• Types of Data Backups (continued)
• A more comprehensive backup technology is known as continuous
data protection (CDP)
• Performs continuous backups that can be restored immediately
• Maintains a historical record of all changes made to data
• Creates a snapshot of the data (like a reference marker)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
33
Off-Site Backups (1 of 2)
• 3-2-1 backup plan
• Should always be three different copies of backups on at least two
different types of storage media and one of the backups should be
stored at a different location (off-site backup)
• Most organizations store their off-site backups using an online cloud
repository
• These sites often use CDP to continually backup data
• There are several Internet services that provide similar features to these:
• Automatic continuous backup
• Universal access
• Delayed deletion
• Online or media-based restore
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
34
Off-Site Backups (2 of 2)
• There are legal implications of off-site backups
• The primary issue involves data sovereignty
• Data stored in digital format is subject to the laws of the country
in which the storage facility resides
• Organizations should identify a cloud services provider whose data
center locations ensure that it fully complies with all applicable data
sovereignty laws
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
35
Environmental Controls
• Methods to prevent disruption through environmental controls
• Fire suppression
• Electromagnetic disruption protection
• Proper configuration of HVAC systems
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
36
Fire Suppression (1 of 2)
• Fire suppression includes the attempts to reduce the impact of a fire
• Requirements for a fire to occur
• A type of fuel or combustible material
• Sufficient oxygen to sustain combustion
• Enough heat to raise material to its ignition temperature
• Chemical reaction: fire itself
• In a server closet or room that contains computer equipment
• A stationary fire suppression system is recommended
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
37
Fire Suppression (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
38
Electromagnetic Disruption Protection (1 of 2)
• Electromagnetic interference (EMI)
• Caused by a short-duration burst of energy by the source called an
electromagnetic pulse (EMP)
• Electromagnetic compatibility (EMC)
• Reducing or eliminating the unintentional generation, spread, and
reception of electromagnetic energy
• The goal of EMC is the correct operation of different types of
equipment that function in the same electromagnetic environment
• Faraday cage
• Metal enclosure that prevents entry or escape of electromagnetic fields
• Often used for testing in electronic labs
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
39
Electromagnetic Disruption Protection (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
40
HVAC
• Data centers have special cooling requirements
• More cooling necessary due to large number of systems generating
heat in confined area
• Precise cooling needed
• Heating, ventilating, and air conditioning (HVAC) systems
• Maintain temperature and relative humidity at required levels
• Controlling environmental factors can reduce electrostatic discharge
• Hot aisle/cold aisle layout
• Used to reduce heat by managing air flow
• Servers lined up in alternating rows with cold air intakes facing one
direction and hot air exhausts facing other direction
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
41
Incident Response
• When an unauthorized incident occurs:
• An immediate response is required
• Incident response
• Involves using forensics and following proper incident response
procedures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
42
What is Forensics?
• Forensic Science
• Applying science to legal questions
• Analyzing evidence and can be applied to technology
• Computer forensics
• Uses technology to search for computer evidence of a crime
• Importance of computer forensics is due to the following:
• Amount of digital evidence
• Increased scrutiny by the legal profession
• Higher level of computer skill by criminals
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
43
Incident Response Plan (1 of 2)
• Incident response plan (IRP)
• A set of written instructions for reacting to a security incident
• Incident response process – six action steps to be taken when an
incident occurs:
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
44
Incident Response Plan (2 of 2)
• At a minimum, an IRP should contain the following:
• Documented incident definitions
• Cyber-incident response teams
• Reporting requirements/escalation
• Exercises
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
45
Forensic Procedures
• Five basic steps:
• Secure the crime scene
• Preserve the evidence
• Establish a chain of custody
• Examine the evidence
• Enable recovery
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
46
Secure the Crime Scene (1 of 2)
• When an illegal or unauthorized incident occurs, action must be taken
immediately
• Individuals in the immediate vicinity should perform damage control:
• Report the incident to security or police
• Confront any suspects (if situation allows)
• Neutralize the suspected perpetrator from harming others
• Secure physical security features
• Quarantine electronic equipment
• Contact the cyber-incident response team
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
47
Secure the Crime Scene (2 of 2)
• After the response team arrives, the first job is to secure the crime
scene, which includes:
• Physical surroundings documented
• Photographs taken before anything is touched
• Computer cables labeled
• Team takes custody of entire computer
• Team interviews witnesses
• Length of time passed since the initial incident should be noted
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
48
Preserve the Evidence (1 of 3)
• Preservation of the evidence
• Ensuring that important proof is not destroyed
• Digital evidence is very fragile
• Can be easily altered or destroyed
• One of the first steps is for a legal hold to be issued
• A notification sent from the legal team to employees instructing them
not to delete electronically stored or paper documents relative to the
incident
• Cyber-incident response team captures volatile data
• Examples: contents of RAM, current network connections, logon
sessions, network traffic and logs, any open files
• Order of volatility must be followed to preserve most fragile data first
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
49
Preserve the Evidence (2 of 3)
Location of data Sequence to be retrieved
Register, cache, peripheral memory First
Random access memory (RAM) Second
Network state Third
Running processes Fourth
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
50
Preserve the Evidence (3 of 3)
• Use tools that allow capturing the system image
• A snapshot of the current state of the computer that contains all current
settings and data
• Capture the current image on the screen by taking a screenshot
• Mirror image backup of the hard drive (also called a bit-stream backup)
• Meets evidence standards
• To guarantee accuracy, mirror image backup programs rely upon
hashing algorithms as part of the validation process
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
51
Establish the Chain of Custody
• Chain of custody
• Documents that the evidence was maintained under strict control at all
times
• No unauthorized person was given opportunity to corrupt the evidence
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
52
Examine for Evidence (1 of 3)
• After a computer forensics expert creates a mirror image of a system,
the original system is secured and the mirror image is examined to
reveal evidence
• Includes searching:
• Word documents, email files, spreadsheets, cache and cookies of
the web browser
• Hidden clues also can be exposed by examining
• RAM slack, drive slack, and metadata (data about data)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
53
Examine for Evidence (2 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
54
Examine for Evidence (3 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
55
Enable Recovery
• Strategic intelligence
• The collection, processing, analysis, and dissemination of intelligence
for forming policy changes
• Strategic counterintelligence
• Involves gaining information about the attacker’s intelligence collection
capabilities
• Active logging
• Maintaining active logs regarding the reconnaissance activities
conducted by the attacker
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
56
Chapter Summary (1 of 3)
• Business continuity is an organization’s ability to maintain its operations
after a disruptive event
• In IT contingency planning, an outline of procedures that are to be
followed in the event of a major IT incident is developed
• Disaster recovery
• Focuses on restoring information technology functions
• Disaster recovery plan (DRP) details restoration process
• A server cluster combines two or more servers that are interconnected
to appear as one
• RAID uses multiple hard disk drives for redundancy
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
57
Chapter Summary (2 of 3)
• Network components can be duplicated to provide a redundant network
• Data backup
• Copying information to a different medium and storing (preferably
offsite) for use in event of a disaster
• Recovery point objective and recovery time objective help an
organization determine backup frequency
• Fire suppression systems include water, dry chemical, and clean agent
systems
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
58
Chapter Summary (3 of 3)
• A defense for shielding an electromagnetic field is a Faraday cage
• The control and maintenance of HVAC systems are important for data
centers
• Forensic science is the application of science to questions that are of
interest to the legal profession
• An incident response plan (IRP) is a set of written instructions for
reacting to a security incident
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.

More Related Content

What's hot

Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
Dr. Ahmed Al Zaidy
 
Network address translation
Network address translationNetwork address translation
Network address translation
Karppinen Ngoc Anh
 
Hosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm Önerileri
Hosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm ÖnerileriHosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm Önerileri
Hosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm ÖnerileriBGA Cyber Security
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Yoram Orzach
 
Oscp preparation
Oscp preparationOscp preparation
Oscp preparation
Manich Koomsusi
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
Pina Parmar
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
Tiger Virani
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
Shyama Bhuvanendran
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security Vulnerabilities
Marius Vorster
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
Santosh Khadsare
 
Metasploit
MetasploitMetasploit
Firewall
FirewallFirewall
Firewall
Mudasser Afzal
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Hosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm Önerileri
Hosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm ÖnerileriHosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm Önerileri
Hosting Firmalarına Yönelik DDoS Saldırıları ve Çözüm Önerileri
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Oscp preparation
Oscp preparationOscp preparation
Oscp preparation
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security Vulnerabilities
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Metasploit
MetasploitMetasploit
Metasploit
 
Firewall
FirewallFirewall
Firewall
 

Similar to Chapter 14 Business Continuity

Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
Dr. Ahmed Al Zaidy
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
Dr. Ahmed Al Zaidy
 
Whitman_Ch12.pptx
Whitman_Ch12.pptxWhitman_Ch12.pptx
Whitman_Ch12.pptx
Siphamandla9
 
Python Fundamentals
Python FundamentalsPython Fundamentals
Python Fundamentals
pullaravikumar
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
Dr. Ahmed Al Zaidy
 
Whitman_Ch05.pptx
Whitman_Ch05.pptxWhitman_Ch05.pptx
Whitman_Ch05.pptx
Siphamandla9
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
Siphamandla9
 
Whitman_Ch10.pptx
Whitman_Ch10.pptxWhitman_Ch10.pptx
Whitman_Ch10.pptx
Siphamandla9
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Dr. Ahmed Al Zaidy
 
9781337102087 ppt ch15
9781337102087 ppt ch159781337102087 ppt ch15
9781337102087 ppt ch15
Terry Yoast
 
ch12text.pdf
ch12text.pdfch12text.pdf
ch12text.pdf
HashimAli631806
 
Coronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptxCoronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptx
rmzx1989
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
ONE BCG
 
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7
Steve Guinan
 
chapter-02.pptx
chapter-02.pptxchapter-02.pptx
chapter-02.pptx
YantiAndriyani3
 
Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptx
Siphamandla9
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
dgdotson
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
dgdotson
 
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningOracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & Tuning
Chris Muir
 
Module 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptxModule 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptx
tahreerbassam2014
 

Similar to Chapter 14 Business Continuity (20)

Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 
Whitman_Ch12.pptx
Whitman_Ch12.pptxWhitman_Ch12.pptx
Whitman_Ch12.pptx
 
Python Fundamentals
Python FundamentalsPython Fundamentals
Python Fundamentals
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
Whitman_Ch05.pptx
Whitman_Ch05.pptxWhitman_Ch05.pptx
Whitman_Ch05.pptx
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
 
Whitman_Ch10.pptx
Whitman_Ch10.pptxWhitman_Ch10.pptx
Whitman_Ch10.pptx
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
 
9781337102087 ppt ch15
9781337102087 ppt ch159781337102087 ppt ch15
9781337102087 ppt ch15
 
ch12text.pdf
ch12text.pdfch12text.pdf
ch12text.pdf
 
Coronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptxCoronel_DatabaseSystems_13e_ch02.pptx
Coronel_DatabaseSystems_13e_ch02.pptx
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
 
Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7Intro to Web Design 6e Chapter 7
Intro to Web Design 6e Chapter 7
 
chapter-02.pptx
chapter-02.pptxchapter-02.pptx
chapter-02.pptx
 
Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptx
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
 
Ecc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentationEcc 2016 module 1 ppt presentation
Ecc 2016 module 1 ppt presentation
 
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningOracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & Tuning
 
Module 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptxModule 2 Threat Management and Cybersecurity Resources (1).pptx
Module 2 Threat Management and Cybersecurity Resources (1).pptx
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
Dr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
Dr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
Dr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
Dr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
Dr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
Dr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
Dr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
Dr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
Dr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
Dr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
Dr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
Dr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
Dr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
Dr. Ahmed Al Zaidy
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
Dr. Ahmed Al Zaidy
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
Dr. Ahmed Al Zaidy
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
Dr. Ahmed Al Zaidy
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Dr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (19)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 

Chapter 14 Business Continuity

  • 1. 1 CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition Chapter 14 Business Continuity © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. Objectiaves 14.1 Describe the different types of wireless network attacks 14.2 List the vulnerabilities in IEEE 802.11 security 14.3 Explain the solutions for securing a wireless network © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 3. 3 What is Business Continuity? • Business Continuity • An organization’s ability to maintain operations after a disruptive event • Business continuity preparedness involves: • Business continuity planning • Business impact analysis • Disaster recovery planning © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 4. 4 Business Continuity Planning (BCP) • BCP is the process of: • Identifying exposure to threats • Creating preventative and recovery procedures • Testing them to determine if they are sufficient • BCP consists of three essential elements: • Business recovery planning • Crisis management and communications • Disaster recovery © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 5. 5 Business Impact Analysis (BIA) (1 of 2) • BIA - identifies business functions and quantifies the impact a loss of these functions may have on business operations • These range from: • Impact on property (tangible assets) • Impact on finance (monetary funding) • Impact on safety (physical protection) • Impact on reputation (status) • Impact on life (wellbeing) • A BIA will help determine the mission-essential function • Activity that serves as the core purpose of the enterprise © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 6. 6 Business Impact Analysis (BIA) (2 of 2) • A BIA can also help in the identification of critical system • That support the mission-essential function • Identifying a single point of failure • Which is a component or entity in a system which will disable the entire system, should it no longer function • Minimizing these single failure points results in high availability • Many BIAs also contain a privacy impact assessment • Used to identify and mitigate privacy risks • Privacy threshold assessment • Can determine if a system contains personally identifiable information (PII) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 7. 7 Disaster Recovery Plan (DRP) (1 of 5) • Disaster recovery plan (DRP) • Focuses on protecting and restoring information technology functions • Written document detailing process for restoring IT resources: • Following a disruptive event • Comprehensive in scope • Intended to be a detailed document that is updated regularly • Most DRPs: • Have a common set of features • Cover specific topics • Require testing for verification © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 8. 8 Disaster Recovery Plan (DRP) (2 of 5) • Features • Typical outline of a DRP: • Unit 1: Purpose and Scope • Unit 2: Recovery Team • Unit 3: Preparing for a Disaster • Unit 4: Emergency Procedures • Unit 5: Restoration Procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 9. 9 Disaster Recovery Plan (DRP) (3 of 5) • Topics • Sequence in restoring systems (order of restoration) -Which systems should have priority and be restored before other systems? • What should be done if a disaster makes the current location for processing data no longer available -An alternative processing site must be identified -Failback – the process of resynchronizing data back to the primary location © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 10. 10 Disaster Recovery Plan (DRP) (4 of 5) • Testing • Disaster exercises are designed to test the effectiveness of the DRP • Disaster exercise objectives • Test efficiency of interdepartmental planning and coordination in managing a disaster • Test current DRP procedures • Determine response strengths and weaknesses • Tabletop exercises • Simulate an emergency situation but in an informal and stress-free environment • An after-action report should be generated • To analyze the exercise results to identify strengths to be maintained and weaknesses to improve upon © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 11. 11 Disaster Recovery Plan (DRP) (5 of 5) Feature Description Participants Individuals on a decision-making level Focus Training and familiarizing roles, procedures, and responsibilities Setting Informal Format Discussion guided by a facilitator Purpose Identify and solve problems as a group Commitment Only moderate amount of time, cost, and resources Advantage Can acquaint key personnel with emergency responsibilities, procedures, and other members Disadvantage Lack of realism; does not provide a true test © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 12. 12 Fault Tolerance Through Redundancy • Fault tolerance • Refers to a system’s ability to deal with malfunctions • The solution to fault tolerance is to build in redundancy • Which is the use of duplicated equipment to improve the availability of a system • A goal is to reduce a variable known as the mean time to recovery (MTTR) -The average amount of time that it will take a device to recover from a failure that is not a terminal failure • Redundancy planning • Applies to servers, storage, networks, power, sites, and data © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 13. 13 Servers (1 of 3) • Servers • Play a key role in network infrastructure • Failure can have significant business impact • Clustering • Combining two or more devices to appear as a single unit • Server cluster • Multiple servers that appear as a single server • Connected through public and private cluster connections • Types of server clusters • Asymmetric • Symmetric © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 14. 14 Servers (2 of 3) • In an asymmetric server cluster, a standby server performs no function except to be ready if needed • Used for databases, messaging systems, file and print services • All servers do useful work in a symmetric server cluster • If one server fails, remaining servers take on failed server’s work • More cost effective than asymmetric clusters • Used for Web, media, and VPN servers © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 15. 15 Servers (3 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 16. 16 Storage (1 of 6) • Storage - a trend in data storage is to use solid-state drives (SSDs) • SSDs are more resistant to failure and are considered more reliable than traditional HDDs • HDDs are often the first components to fail • Some organizations keep spare hard drives on hand • Mean time between failures (MTBF) • Measures average time until a component fails and must be replaced • Can be used to determine number of spare hard drives an organization should keep © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 17. 17 Storage (2 of 6) • Redundant Array of Independent Devices (RAID) • Uses multiple hard disk drives to increase reliability and performance • Can be implemented through software or hardware • Several levels of RAID exist • RAID Level 0 (striped disk array without fault tolerance) • Striping partitions hard drive into smaller sections • Data written to the stripes is alternated across the drives • If one drive fails, all data on that drive is lost © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 18. 18 Storage (3 of 6) • RAID Level 1 (mirroring) • Disk mirroring used to connect multiple drives to the same disk controller card • Action on primary drive is duplicated on other drive • Primary drive can fail and data will not be lost • Disk duplexing • Variation of RAID Level 1 • Separate cards used for each disk • Protects against controller card failures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 19. 19 Storage (4 of 6) • RAID Level 5 (independent disks with distributed parity) • Distributes parity (error checking) across all drives • Data stored on one drive and its parity information stored on another drive © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 20. 20 Storage (5 of 6) • RAID 0+1 (high data transfer) • Nested-level RAID • Mirrored array whose segments are RAID 0 arrays • Can achieve high data transfer rates © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 21. 21 Storage (6 of 6) RAID level Description Min number of drives needed Typical application Advantages Disadvantages RAID 0 Uses a striped disk array so that data is broken down into block and each block is written to a separate disk drive 2 Video production and editing Simple design, easy to implement Not fault- tolerant RAID 1 Data written twice to separate drives 2 Financial Simplest RAID to implement Can slow down system if RAID controlling software is used instead of hardware RAID 5 Each data block is written on a data disk and parity for blocks in the same rank is generated and recorded on a separate disk 3 Database Most versatile RAID Can be difficult to rebuild if a disk fails RAID 0+1 A mirrored array with segments that are RAID 0 arrays 4 Imaging applications High input/output rates Expensive © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 22. 22 Networks • Redundant networks • May be necessary due to critical nature of connectivity today • Wait in the background during normal operations • Use a replication scheme to keep live network information current • Launch automatically in the event of a disaster • Hardware components are duplicated • Some organizations contract with a second Internet service provider as a backup • Software defined networks (SDNs) • SDN controller can increase network reliability and may lessen the need for redundant equipment © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 23. 23 Power (1 of 2) • Maintaining power is essential when planning for redundancy • Uninterruptible power supply (UPS) • Maintains power to equipment in the event of an interruption in primary electrical power source • Off-line UPS • Least expensive, simplest solution • Charged by main power supply • Begins supplying power quickly when primary power is interrupted • Switches back to standby mode when primary power is restored © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 24. 24 Power (2 of 2) • On-line UPS • Always running off its battery while main power runs battery charger • Not affected by dips or sags in voltage • Can serve as a surge protector • UPS systems can communicate with the network operating system to ensure orderly shutdown occurs • But, can only supply power for a limited time • Backup generator • Powered by diesel, natural gas, or propane © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 25. 25 Recovery Sites (1 of 3) • Recovery Sites • Backup sites may be necessary if flood, hurricane, or other major disaster damages buildings • Three types of redundant sites: hot, cold, and warm • Hot site • Generally run by a commercial disaster recovery service • Duplicate of the production site • Has all needed equipment • Data backups can be moved quickly to the hot site © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 26. 26 Recovery Sites (2 of 3) • Cold site • Provides office space • Customer must provide and install all equipment needed to continue operations • No backups immediately available • Less expensive than a hot site • Takes longer to resume full operation © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 27. 27 Recovery Sites (3 of 3) • Warm site • All equipment is installed • No active Internet or telecommunications facilities • No current data backups • Less expensive than a hot site • Time to turn on connections and install backups can be half a day or more • A growing trend is to use cloud computing in conjunction with sites • Back up applications and data to the cloud • If a disaster occurs, restore it to hardware in a hot, cold, or warm site © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 28. 28 Data (1 of 5) • Data backup – copying information to a different medium and storing it at an off-site location • So that it can be used in the event of a disaster • Backing up data involves: • Data backup calculations • Using different types of data backups • Off-site backups © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 29. 29 Data (2 of 5) • Two elements are used in the calculation of when backups should be performed: • Recovery point objective (RPO) • Maximum length of time organization can tolerate between backups • Recovery time objective (RTO) • Length of time it will take to recover backed up data © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 30. 30 Data (3 of 5) • Types of Data Backups Type of backup How used Archive bit after backup Files needed for recovery Full backup Starting point for all backups Cleared (set to 0) The full backup is needed Differential backup Backs up any data that has changed since last full backup Not cleared (set to 1) The full backup and only last differential backup are needed Incremental backup Backs up any data that has changed since last full backup or last incremental backup Cleared (set to 0) The full backup and all incremental backups are needed © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 31. 31 Data (4 of 5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 32. 32 Data (5 of 5) • Types of Data Backups (continued) • A more comprehensive backup technology is known as continuous data protection (CDP) • Performs continuous backups that can be restored immediately • Maintains a historical record of all changes made to data • Creates a snapshot of the data (like a reference marker) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 33. 33 Off-Site Backups (1 of 2) • 3-2-1 backup plan • Should always be three different copies of backups on at least two different types of storage media and one of the backups should be stored at a different location (off-site backup) • Most organizations store their off-site backups using an online cloud repository • These sites often use CDP to continually backup data • There are several Internet services that provide similar features to these: • Automatic continuous backup • Universal access • Delayed deletion • Online or media-based restore © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 34. 34 Off-Site Backups (2 of 2) • There are legal implications of off-site backups • The primary issue involves data sovereignty • Data stored in digital format is subject to the laws of the country in which the storage facility resides • Organizations should identify a cloud services provider whose data center locations ensure that it fully complies with all applicable data sovereignty laws © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 35. 35 Environmental Controls • Methods to prevent disruption through environmental controls • Fire suppression • Electromagnetic disruption protection • Proper configuration of HVAC systems © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 36. 36 Fire Suppression (1 of 2) • Fire suppression includes the attempts to reduce the impact of a fire • Requirements for a fire to occur • A type of fuel or combustible material • Sufficient oxygen to sustain combustion • Enough heat to raise material to its ignition temperature • Chemical reaction: fire itself • In a server closet or room that contains computer equipment • A stationary fire suppression system is recommended © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 37. 37 Fire Suppression (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 38. 38 Electromagnetic Disruption Protection (1 of 2) • Electromagnetic interference (EMI) • Caused by a short-duration burst of energy by the source called an electromagnetic pulse (EMP) • Electromagnetic compatibility (EMC) • Reducing or eliminating the unintentional generation, spread, and reception of electromagnetic energy • The goal of EMC is the correct operation of different types of equipment that function in the same electromagnetic environment • Faraday cage • Metal enclosure that prevents entry or escape of electromagnetic fields • Often used for testing in electronic labs © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 39. 39 Electromagnetic Disruption Protection (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 40. 40 HVAC • Data centers have special cooling requirements • More cooling necessary due to large number of systems generating heat in confined area • Precise cooling needed • Heating, ventilating, and air conditioning (HVAC) systems • Maintain temperature and relative humidity at required levels • Controlling environmental factors can reduce electrostatic discharge • Hot aisle/cold aisle layout • Used to reduce heat by managing air flow • Servers lined up in alternating rows with cold air intakes facing one direction and hot air exhausts facing other direction © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 41. 41 Incident Response • When an unauthorized incident occurs: • An immediate response is required • Incident response • Involves using forensics and following proper incident response procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 42. 42 What is Forensics? • Forensic Science • Applying science to legal questions • Analyzing evidence and can be applied to technology • Computer forensics • Uses technology to search for computer evidence of a crime • Importance of computer forensics is due to the following: • Amount of digital evidence • Increased scrutiny by the legal profession • Higher level of computer skill by criminals © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 43. 43 Incident Response Plan (1 of 2) • Incident response plan (IRP) • A set of written instructions for reacting to a security incident • Incident response process – six action steps to be taken when an incident occurs: • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 44. 44 Incident Response Plan (2 of 2) • At a minimum, an IRP should contain the following: • Documented incident definitions • Cyber-incident response teams • Reporting requirements/escalation • Exercises © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 45. 45 Forensic Procedures • Five basic steps: • Secure the crime scene • Preserve the evidence • Establish a chain of custody • Examine the evidence • Enable recovery © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 46. 46 Secure the Crime Scene (1 of 2) • When an illegal or unauthorized incident occurs, action must be taken immediately • Individuals in the immediate vicinity should perform damage control: • Report the incident to security or police • Confront any suspects (if situation allows) • Neutralize the suspected perpetrator from harming others • Secure physical security features • Quarantine electronic equipment • Contact the cyber-incident response team © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 47. 47 Secure the Crime Scene (2 of 2) • After the response team arrives, the first job is to secure the crime scene, which includes: • Physical surroundings documented • Photographs taken before anything is touched • Computer cables labeled • Team takes custody of entire computer • Team interviews witnesses • Length of time passed since the initial incident should be noted © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 48. 48 Preserve the Evidence (1 of 3) • Preservation of the evidence • Ensuring that important proof is not destroyed • Digital evidence is very fragile • Can be easily altered or destroyed • One of the first steps is for a legal hold to be issued • A notification sent from the legal team to employees instructing them not to delete electronically stored or paper documents relative to the incident • Cyber-incident response team captures volatile data • Examples: contents of RAM, current network connections, logon sessions, network traffic and logs, any open files • Order of volatility must be followed to preserve most fragile data first © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 49. 49 Preserve the Evidence (2 of 3) Location of data Sequence to be retrieved Register, cache, peripheral memory First Random access memory (RAM) Second Network state Third Running processes Fourth © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 50. 50 Preserve the Evidence (3 of 3) • Use tools that allow capturing the system image • A snapshot of the current state of the computer that contains all current settings and data • Capture the current image on the screen by taking a screenshot • Mirror image backup of the hard drive (also called a bit-stream backup) • Meets evidence standards • To guarantee accuracy, mirror image backup programs rely upon hashing algorithms as part of the validation process © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 51. 51 Establish the Chain of Custody • Chain of custody • Documents that the evidence was maintained under strict control at all times • No unauthorized person was given opportunity to corrupt the evidence © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 52. 52 Examine for Evidence (1 of 3) • After a computer forensics expert creates a mirror image of a system, the original system is secured and the mirror image is examined to reveal evidence • Includes searching: • Word documents, email files, spreadsheets, cache and cookies of the web browser • Hidden clues also can be exposed by examining • RAM slack, drive slack, and metadata (data about data) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 53. 53 Examine for Evidence (2 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 54. 54 Examine for Evidence (3 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 55. 55 Enable Recovery • Strategic intelligence • The collection, processing, analysis, and dissemination of intelligence for forming policy changes • Strategic counterintelligence • Involves gaining information about the attacker’s intelligence collection capabilities • Active logging • Maintaining active logs regarding the reconnaissance activities conducted by the attacker © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 56. 56 Chapter Summary (1 of 3) • Business continuity is an organization’s ability to maintain its operations after a disruptive event • In IT contingency planning, an outline of procedures that are to be followed in the event of a major IT incident is developed • Disaster recovery • Focuses on restoring information technology functions • Disaster recovery plan (DRP) details restoration process • A server cluster combines two or more servers that are interconnected to appear as one • RAID uses multiple hard disk drives for redundancy © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 57. 57 Chapter Summary (2 of 3) • Network components can be duplicated to provide a redundant network • Data backup • Copying information to a different medium and storing (preferably offsite) for use in event of a disaster • Recovery point objective and recovery time objective help an organization determine backup frequency • Fire suppression systems include water, dry chemical, and clean agent systems © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 58. 58 Chapter Summary (3 of 3) • A defense for shielding an electromagnetic field is a Faraday cage • The control and maintenance of HVAC systems are important for data centers • Forensic science is the application of science to questions that are of interest to the legal profession • An incident response plan (IRP) is a set of written instructions for reacting to a security incident © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.