SlideShare a Scribd company logo
ManagementInformation Systemsin Organizations DISASTER RECOVERY PLAN Prepared by: Jan Wong
The Learning Outcomes At the end of this session you should be able to: the importance ofdisaster recovery in an organization EXAMINE the steps in risk management approach DESCRIBE backup systems and system recovery DISCUSS
Danger Jeopardy Threat RISKS Peril Menace Hazard
Thinking about risk ,[object Object]
Impact (cost) if it happensIs it possible to protect against every risk? What is RISK? “The chance of a negative outcome”
A risk-management approachhelps  identify threats and  select cost-effective security measures. Risk-management analysis can be enhanced by the use of DSS software packages.  Calculations can be used  to compare the expected loss with the cost of preventing it.  A business continuity planoutlines the process in which businesses should recover from a major disaster Risk ManagementApproach “What is it all about?”
What are the STEPS in RISK MGMT.?
STEP 1: Determine the value and importance of assets Infrastructure: hardware, networks, security environment itself Software environment Staff Cost of replacement Cost of loss of use Assessment of assets
STEP 2: List all potential threats Review the current protection/controls system Record weaknesses in the current protection system in view of all the potential threats Vulnerability of assets
STEP 3: Assess the probability of damage Specify the tangible and intangible losses that may result Loss analysis
STEP 4: Provide a description of available controls that should be considered – general, application, network etc Probability of successful defense The cost Protection analysis
STEP 5: Compare cost and benefits Decide on which controls to install Cost Benefit Analysis
Intended to: Prevent accidental hazards Deter intentional acts Detect problems ASAP Enhance damage recovery Correct problems comprehensively Controls to Mitigate Risk
Increasing the Reliability of Systems Fault tolerance to keep the information systems working, even if some parts fail.  Intelligent Systems for  Early Detection of problems Detecting intrusion IT Security in the 21st Security
Why do we need to back up systems? Because systems fail Impact  From minor irritation to business closedown Back up system to:  Periodic in Local storage Periodic in Remote storage Mirror site – local Mirror site – distant Withstand fault tolerance Backing-up Systems
System Disaster – it happens! Think about: Loss of power Cyber crime Traumatic damage Hardware failure Statutory Requirement
System Recovery and Business Continuity Is there a relationship between the two? Here are some key thoughts about disaster recovery by Knoll (1986): The purpose of a recovery plan is to keep the business running after a disaster occurs Recovery planning is part of asset protection Planning should focus first on recovery from a total loss of all capabilities
How to ensure that the recovery system works Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current All critical applications must be identified and their recovery procedures addressed in the plan
Disaster Recovery Plan In other words: BACK UP PROCEDURES In the event of a major disaster it may be necessary to move to another back up location.
Disaster Recovery Plan Considerations Customers Facilities Communications Infrastructure Disaster  Recovery Plan Knowledge Workers Computer Equipment Business Information PGM
Disaster Recovery Plan HOT SITE VENDORS External hot site vendors provide access to a fully configured back up data center. Following the 1989 San Francisco earthquake Charles Schwab were up and running in New Jersey the following morning. PGM
Disaster Recovery Plan COLD SITE VENDORS Provide empty office space with special flooring, wiring and ventilation. In an emergency the affected company moves its own or leased computers to the cold site. These back up sites may work well for a company with centralised computing facilities but what can a company with a distributed network system do? PGM
Physical access control Uninterrupted power supply (UPS) Generator Humidity control Temperature control Water Detector Raised Floors Fire Extinguisher  Alarm Methods to Control & Secure I.S. PGM
THINGS TO TAKE NOTE OFF Risk management approach (the 5 steps) What are the different risk mitigation controls? Types of back-up systems What is a disaster recovery plan? What should be considered in a disaster recovery plan?
Managing System Security
IT’S TIME FOR SOME DISCUSSIONS! List and briefly describe the steps involved in risk analysis of controls. Define and describe a disaster recovery plan. What are “hot” and “cold” recovery sites? Explain why risk management should involve the following elements: threats, exposure associated with each threat, risk of each threat occurring, and cost of controls, as well as assessment of their effectiveness. Why should information control and security be a prime concern to management?
IT’S TIME FOR ANIN-CLASS ACTIVITY! Get into groups of 5-6 members Using the Risk Management Approach (5-Steps), apply it to your company / one company of your choice as below: GSC Cinemas Ticketing / Fashion Retail (brick-and-mortar) / IBM / Malaysian Airlines Ticketing / Hilton Hotel Reservation / Facebook Suggest which Risk Mitigation Control should you implement and how it can help you mitigate your risk Present your approach the class

More Related Content

What's hot

Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk Management
Omicron Systems
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
Resolver Inc.
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planningmmohamme1124
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
EC-Council
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
Praveen Vackayil
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability ManagementVicky Ames
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions
Deepak Kamboj
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
Emilie Gray
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
jpubal
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
 
Business Contingency Planning
Business Contingency PlanningBusiness Contingency Planning
Business Contingency Planning
ahmad bassiouny
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
Dan Morrill
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
Skybox Security
 

What's hot (18)

Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk Management
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planning
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Information Security
Information SecurityInformation Security
Information Security
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
Business Contingency Planning
Business Contingency PlanningBusiness Contingency Planning
Business Contingency Planning
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 

Viewers also liked

MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)
Jan Wong
 
MISO L001 digital economy
MISO L001 digital economyMISO L001 digital economy
MISO L001 digital economyJan Wong
 
MISO L002 it concepts and management
MISO L002 it concepts and managementMISO L002 it concepts and management
MISO L002 it concepts and managementJan Wong
 
Decision Making for Entrepreneurs
Decision Making for EntrepreneursDecision Making for Entrepreneurs
Decision Making for Entrepreneurs
Jan Wong
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
MISO L003 network computing
MISO L003 network computingMISO L003 network computing
MISO L003 network computingJan Wong
 
MISO L005 Understanding ERP
MISO L005 Understanding ERPMISO L005 Understanding ERP
MISO L005 Understanding ERPJan Wong
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT StrategyJan Wong
 
MISO L004 e commerce.ppt
MISO L004 e commerce.pptMISO L004 e commerce.ppt
MISO L004 e commerce.pptJan Wong
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
Indeevari Ramanayake
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
 
Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...
Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...
Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...StorageCraft Benelux
 
Information system managment disaster recovery
Information system managment disaster recoveryInformation system managment disaster recovery
Information system managment disaster recovery
Ravi Singh Shekhawat
 
Sql disaster recovery
Sql disaster recoverySql disaster recovery
Sql disaster recovery
Sqlperfomance
 
Backup, Restore, and Disaster Recovery
Backup, Restore, and Disaster RecoveryBackup, Restore, and Disaster Recovery
Backup, Restore, and Disaster Recovery
MongoDB
 

Viewers also liked (17)

MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)
 
MISO L001 digital economy
MISO L001 digital economyMISO L001 digital economy
MISO L001 digital economy
 
MISO L002 it concepts and management
MISO L002 it concepts and managementMISO L002 it concepts and management
MISO L002 it concepts and management
 
Decision Making for Entrepreneurs
Decision Making for EntrepreneursDecision Making for Entrepreneurs
Decision Making for Entrepreneurs
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
MISO L003 network computing
MISO L003 network computingMISO L003 network computing
MISO L003 network computing
 
MISO L005 Understanding ERP
MISO L005 Understanding ERPMISO L005 Understanding ERP
MISO L005 Understanding ERP
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT Strategy
 
MISO L010
MISO L010MISO L010
MISO L010
 
MISO L004 e commerce.ppt
MISO L004 e commerce.pptMISO L004 e commerce.ppt
MISO L004 e commerce.ppt
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...
Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...
Slide presentation storage_craft_backup_disaster_recovery_for_microsoft_syste...
 
Information system managment disaster recovery
Information system managment disaster recoveryInformation system managment disaster recovery
Information system managment disaster recovery
 
Sql disaster recovery
Sql disaster recoverySql disaster recovery
Sql disaster recovery
 
Backup, Restore, and Disaster Recovery
Backup, Restore, and Disaster RecoveryBackup, Restore, and Disaster Recovery
Backup, Restore, and Disaster Recovery
 

Similar to MISO L008 Disaster Recovery Plan

Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
Adlan Hussain
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
Atef Yassin
 
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxRUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
anhlodge
 
Risk Management
Risk ManagementRisk Management
Risk Management
ijtsrd
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
Dhani Ahmad
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
Marc-Andre Heroux
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
RubaNagarajan
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
Anton Chuvakin
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
Graydon McKee
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Risk Management
Risk Management Risk Management
Risk Management Kapil Rode
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
Soetam Rizky
 
Forkomil 2009 Soetam
Forkomil 2009 SoetamForkomil 2009 Soetam
Forkomil 2009 Soetam
Soetam Rizky
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
walterl4
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 

Similar to MISO L008 Disaster Recovery Plan (20)

Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxRUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Risk Management
Risk Management Risk Management
Risk Management
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Forkomil 2009 Soetam
Forkomil 2009 SoetamForkomil 2009 Soetam
Forkomil 2009 Soetam
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 

More from Jan Wong

IS L06 Communications and Networks
IS L06 Communications and NetworksIS L06 Communications and Networks
IS L06 Communications and Networks
Jan Wong
 
IS L05 Multimedia
IS L05 MultimediaIS L05 Multimedia
IS L05 Multimedia
Jan Wong
 
IS L04 Programming Language
IS L04 Programming LanguageIS L04 Programming Language
IS L04 Programming Language
Jan Wong
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
IS L03 - Database Management
IS L03 - Database ManagementIS L03 - Database Management
IS L03 - Database Management
Jan Wong
 
IS L02 - Development of Information Systems
IS L02 - Development of Information SystemsIS L02 - Development of Information Systems
IS L02 - Development of Information Systems
Jan Wong
 
IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)
Jan Wong
 
L006 IT Strategy (2016)
L006 IT Strategy (2016)L006 IT Strategy (2016)
L006 IT Strategy (2016)
Jan Wong
 
L004 E-Commerce (2016)
L004 E-Commerce (2016)L004 E-Commerce (2016)
L004 E-Commerce (2016)
Jan Wong
 
L003 Network Computing (2016)
L003 Network Computing (2016)L003 Network Computing (2016)
L003 Network Computing (2016)
Jan Wong
 
L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)
Jan Wong
 
Social Media for Entrepreneurs
Social Media for EntrepreneursSocial Media for Entrepreneurs
Social Media for Entrepreneurs
Jan Wong
 
IS CH2 Database Management (p1)
IS CH2 Database Management (p1)IS CH2 Database Management (p1)
IS CH2 Database Management (p1)Jan Wong
 
IS CH1 Introduction to Information Systems
IS CH1 Introduction to Information SystemsIS CH1 Introduction to Information Systems
IS CH1 Introduction to Information SystemsJan Wong
 
IS CH2 Database Management (p2)
IS CH2 Database Management (p2)IS CH2 Database Management (p2)
IS CH2 Database Management (p2)Jan Wong
 

More from Jan Wong (15)

IS L06 Communications and Networks
IS L06 Communications and NetworksIS L06 Communications and Networks
IS L06 Communications and Networks
 
IS L05 Multimedia
IS L05 MultimediaIS L05 Multimedia
IS L05 Multimedia
 
IS L04 Programming Language
IS L04 Programming LanguageIS L04 Programming Language
IS L04 Programming Language
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
IS L03 - Database Management
IS L03 - Database ManagementIS L03 - Database Management
IS L03 - Database Management
 
IS L02 - Development of Information Systems
IS L02 - Development of Information SystemsIS L02 - Development of Information Systems
IS L02 - Development of Information Systems
 
IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)
 
L006 IT Strategy (2016)
L006 IT Strategy (2016)L006 IT Strategy (2016)
L006 IT Strategy (2016)
 
L004 E-Commerce (2016)
L004 E-Commerce (2016)L004 E-Commerce (2016)
L004 E-Commerce (2016)
 
L003 Network Computing (2016)
L003 Network Computing (2016)L003 Network Computing (2016)
L003 Network Computing (2016)
 
L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)
 
Social Media for Entrepreneurs
Social Media for EntrepreneursSocial Media for Entrepreneurs
Social Media for Entrepreneurs
 
IS CH2 Database Management (p1)
IS CH2 Database Management (p1)IS CH2 Database Management (p1)
IS CH2 Database Management (p1)
 
IS CH1 Introduction to Information Systems
IS CH1 Introduction to Information SystemsIS CH1 Introduction to Information Systems
IS CH1 Introduction to Information Systems
 
IS CH2 Database Management (p2)
IS CH2 Database Management (p2)IS CH2 Database Management (p2)
IS CH2 Database Management (p2)
 

Recently uploaded

Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 

Recently uploaded (20)

Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 

MISO L008 Disaster Recovery Plan

  • 1. ManagementInformation Systemsin Organizations DISASTER RECOVERY PLAN Prepared by: Jan Wong
  • 2. The Learning Outcomes At the end of this session you should be able to: the importance ofdisaster recovery in an organization EXAMINE the steps in risk management approach DESCRIBE backup systems and system recovery DISCUSS
  • 3. Danger Jeopardy Threat RISKS Peril Menace Hazard
  • 4.
  • 5. Impact (cost) if it happensIs it possible to protect against every risk? What is RISK? “The chance of a negative outcome”
  • 6. A risk-management approachhelps identify threats and select cost-effective security measures. Risk-management analysis can be enhanced by the use of DSS software packages. Calculations can be used to compare the expected loss with the cost of preventing it. A business continuity planoutlines the process in which businesses should recover from a major disaster Risk ManagementApproach “What is it all about?”
  • 7. What are the STEPS in RISK MGMT.?
  • 8. STEP 1: Determine the value and importance of assets Infrastructure: hardware, networks, security environment itself Software environment Staff Cost of replacement Cost of loss of use Assessment of assets
  • 9. STEP 2: List all potential threats Review the current protection/controls system Record weaknesses in the current protection system in view of all the potential threats Vulnerability of assets
  • 10. STEP 3: Assess the probability of damage Specify the tangible and intangible losses that may result Loss analysis
  • 11. STEP 4: Provide a description of available controls that should be considered – general, application, network etc Probability of successful defense The cost Protection analysis
  • 12. STEP 5: Compare cost and benefits Decide on which controls to install Cost Benefit Analysis
  • 13. Intended to: Prevent accidental hazards Deter intentional acts Detect problems ASAP Enhance damage recovery Correct problems comprehensively Controls to Mitigate Risk
  • 14. Increasing the Reliability of Systems Fault tolerance to keep the information systems working, even if some parts fail. Intelligent Systems for Early Detection of problems Detecting intrusion IT Security in the 21st Security
  • 15. Why do we need to back up systems? Because systems fail Impact From minor irritation to business closedown Back up system to: Periodic in Local storage Periodic in Remote storage Mirror site – local Mirror site – distant Withstand fault tolerance Backing-up Systems
  • 16. System Disaster – it happens! Think about: Loss of power Cyber crime Traumatic damage Hardware failure Statutory Requirement
  • 17. System Recovery and Business Continuity Is there a relationship between the two? Here are some key thoughts about disaster recovery by Knoll (1986): The purpose of a recovery plan is to keep the business running after a disaster occurs Recovery planning is part of asset protection Planning should focus first on recovery from a total loss of all capabilities
  • 18. How to ensure that the recovery system works Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current All critical applications must be identified and their recovery procedures addressed in the plan
  • 19. Disaster Recovery Plan In other words: BACK UP PROCEDURES In the event of a major disaster it may be necessary to move to another back up location.
  • 20. Disaster Recovery Plan Considerations Customers Facilities Communications Infrastructure Disaster Recovery Plan Knowledge Workers Computer Equipment Business Information PGM
  • 21. Disaster Recovery Plan HOT SITE VENDORS External hot site vendors provide access to a fully configured back up data center. Following the 1989 San Francisco earthquake Charles Schwab were up and running in New Jersey the following morning. PGM
  • 22. Disaster Recovery Plan COLD SITE VENDORS Provide empty office space with special flooring, wiring and ventilation. In an emergency the affected company moves its own or leased computers to the cold site. These back up sites may work well for a company with centralised computing facilities but what can a company with a distributed network system do? PGM
  • 23. Physical access control Uninterrupted power supply (UPS) Generator Humidity control Temperature control Water Detector Raised Floors Fire Extinguisher Alarm Methods to Control & Secure I.S. PGM
  • 24. THINGS TO TAKE NOTE OFF Risk management approach (the 5 steps) What are the different risk mitigation controls? Types of back-up systems What is a disaster recovery plan? What should be considered in a disaster recovery plan?
  • 26. IT’S TIME FOR SOME DISCUSSIONS! List and briefly describe the steps involved in risk analysis of controls. Define and describe a disaster recovery plan. What are “hot” and “cold” recovery sites? Explain why risk management should involve the following elements: threats, exposure associated with each threat, risk of each threat occurring, and cost of controls, as well as assessment of their effectiveness. Why should information control and security be a prime concern to management?
  • 27. IT’S TIME FOR ANIN-CLASS ACTIVITY! Get into groups of 5-6 members Using the Risk Management Approach (5-Steps), apply it to your company / one company of your choice as below: GSC Cinemas Ticketing / Fashion Retail (brick-and-mortar) / IBM / Malaysian Airlines Ticketing / Hilton Hotel Reservation / Facebook Suggest which Risk Mitigation Control should you implement and how it can help you mitigate your risk Present your approach the class
  • 28. Coming soon… next class ManagementInformation Systemsin Organizations DISASTER RECOVERY PLAN What is a disaster recovery plan? How does it minimize risk?