In this unit we are going to review a set of computer protection measures also known as countermeasures.

Similar documents
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

BUSINESS CONTINUITY: THE PROFIT SCENARIO

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER

System Requirements for EFS (Electronic Filing System) This manual supersedes all previous versions. Version 3.1

Lesson 10 Data and Hardware Protection

Backup and Restore Strategies

Have a Backup. Learning objectives. An understanding of the importance of backing up and archiving. Ability to prepare a backup plan

The 10 Disaster Planning Essentials For A Small Business Network

BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL

Step-by-Step Guide. Round the clock backup of everything with On- & Off-site Data Protection

THE STATE OF CLOUD & DATA PROTECTION 2018

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Where s Your Third Copy?

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

IT CONTINUITY, BACKUP AND RECOVERY POLICY

Failover Solutions with Open-E Data Storage Server (DSS V6)

PowerVault MD3 Storage Array Enterprise % Availability

misan and isan D Series SANDR Technology: Innovative New Technology Delivers Full Data Protection at the Disk Storage Level May 2008

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

Information Technology Disaster Recovery Planning Audit Redacted Public Report

Online backup subscription service and security overview

Rediffmail Enterprise High Availability Architecture

Ten Security and Reliability Questions to Address Before Implementing ECM

emarketeer Information Security Policy

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER

DISCLOSURE STATEMENT PREPARED BY

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

SECURITY STRATEGY & POLICIES. Understanding How Swift Digital Protects Your Data

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

I/O CANNOT BE IGNORED

Integrating RDX QuikStor TM into NetJapan ActiveImage TM Protector

esureit Online Backup vs. Portable Media

Outline. Failure Types

SECURE CLOUD BACKUP AND RECOVERY

The 10 Disaster Planning Essentials

Disaster Planning Essentials and Disaster Planning Checklist

Copyright 2012 EMC Corporation. All rights reserved.

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

ECE Engineering Robust Server Software. Spring 2018

Physical and Environmental Security Standards

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo

OpenDrives storage solutions facilitate smart business continuity strategies.

SAS SOLUTIONS ONDEMAND

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

10 Reasons Why Your DR Plan Won t Work

Memorandum APPENDIX 2. April 3, Audit Committee

Data Center Operations Guide

Information Storage and Management TM Volume 2 of 2 Student Guide. EMC Education Services

Disaster Recovery Is A Business Strategy

Windows Server Security Best Practices

Disaster Recovery Committee. Learning Resource Center Specialist

Introduction to Business continuity Planning

Provided as an educational service by: Introduction

StealthWatch System Disaster Recovery Guide Recommendations and Procedures. System version 6.7.x

Study on Computer Network Technology of Digital Library

Chapter 1 B: Exploring the Network

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

Disaster Recovery Self-Audit

ZYNSTRA TECHNICAL BRIEFING NOTE

IBM TS7700 grid solutions for business continuity

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED

White Paper. Disaster Recovery in the Cloud

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES

COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services

Disk-to-Disk-to-Tape (D2D2T)

SKYKICK CLOUD BACKUP. The fast, easy way to backup all your Office 365 data

The Office Procedures and Technology

Glossary of Terms Used in Actifio Products

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

Disaster Recovery (DR) Planning with the Cloud Desktop

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

A Guide to Ensuring Security and Resiliency

Information Systems. Data Protection Disaster recovery Backups

The Actifio Glossary A B C D E F G H I-K L M N-O P-Q R S T U V W-Z

Repairing the Broken State of Data Protection

Disaster Recovery and Business Continuity

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

Data Protection in a Nutshell

What can the OnBase Cloud do for you? lbmctech.com

Routing Journal Operations on Disks Using Striping With Parity 1

Now I can sleep at night

Protecting VMware vsphere/esx Environments with Arcserve

Common Preventive Maintenance Techniques for Operating Systems

Business Continuity Planning Keeping Pace with New Technology

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Moving to the cloud:self-aws hosting

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

Associate Professor Dr. Raed Ibraheem Hamed

SCALEFAST COMMERCE CLOUD INFRASTRUCTURE

An SMB s Guide to Business Continuity and Disaster Recovery

MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery

CA ARCserve Backup. Benefits. Overview. The CA Advantage

IST346: Information Security Risk Management

What to Look for in a DRaaS Solution

Understanding Office 365: Is A Cloud Based Solution Right For Your Business?

Transcription:

1

In this unit we are going to review a set of computer protection measures also known as countermeasures. A countermeasure can be defined as an action, device, procedure, or technique that reduces a threat, vulnerability or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. In the next few slides we will explain these four kinds of countermeasure. 2

We will start with measures taken to cope with failures and physical disasters. The first measure that we can use in critical systems to ensure business continuity is redundancy in hardware, software and communications resources, replicating critical components and incorporating fail-safe mechanisms that, in case of a failure, let a back-up device resume the work without interruption (or within the maximum interruption time that a business can cope with). We can also use spatial diversity when introducing this countermeasure; for example, locating a back-up data center in another building so that if there is a fire where our main data center is located, the second one won t be affected and we can continue. Or say some kind of construction work breaks a communication cable, if we have a second cable following a different physical path or a wireless link, then we can route our traffic through these alternatives. 3

We should take measures to protect our hardware from physical risks. Installing a fire detection and suppression system, protecting the hardware from theft with an alarm system, building reinforced disaster resistant facilities or not building a data center where it might be affected by flood water, are a few examples. In the slide you can see a photo of the massive flooding in Thailand that affected the world supply of hard disks in 2011. 4

Information systems hardware works with electricity, and it can be very vulnerable to sudden loss of power, so we must protect it against power cuts. Uninterruptible Power Supplies (UPS) are used for short and sudden power interruptions. This method uses batteries to substitute the mains power supply and has switching mechanisms to ensure that the equipment receives constant and continuous power. The power is also stabilized, thereby avoiding any electrical problem that could damage the hardware. As the batteries used have a limited capacity, electric power generators should be included if we want to guarantee that the system will work during power outages that last any length of time. The most common generators are based on internal combustion engines. 5

A data backup refers to the periodic copying and archiving of computer data so it may be used to restore the original after a data loss event. The primary purpose is to recover data after its loss, whether this was caused by data deletion or corruption. A secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application. A plethora of storage media and services can be used for this purpose, among them, magnetic tapes, hard disks in different configurations (such as RAID, or Redundant Array of Independent Disks), optical storage, solid-state storage and remote backup services. This last option is also known as Cloud Backup or Backup-as-a-Service, where a company provides this type of service to end users. This can be considered as a form of cloud computing. Data backup is a practice that every computer user should apply, even individual users in their homes. In our technology-driven world there is a saying that there are only two kinds of people, those with data backup and those that, at some point in their lives, will regret not having it. 6

7