Disaster recovery plans and preventive measures ensure business continuity. The main question is "What if the attacker succeeds and the organization's functions are not realized?" Whether the disruption of business continuity is short-term or long-term, this is where the organization's disaster recovery plan comes into play. A disaster recovery plan defines the resources, operations, and data required to recover critical business processes that are damaged or disabled due to a disaster. By focusing on disaster recovery plans and precautions, network administrators can minimize the impact that catastrophic events can have on their environment. Recovery plans are the best way to ensure that your business survives an IT emergency.
The various potential disasters that security administrators need to focus on can be classified as human events, natural disasters, internal conflicts, armed conflicts and external conflicts. Man-made accidents may include power loss, transportation accidents and chemical pollution. Natural accidents may include floods, earthquakes and tornadoes. Internal events include destruction, theft and employee violence. Armed conflicts may include terrorist acts such as the 9/11 attacks, civil strife and war. External incidents include hacking, unauthorized use and industrial espionage.
The organization identifies potential threats and analyzes the goals that need to be achieved in order to continue to operate as if nothing had happened. After identifying these potential threats, security administrators can better protect mission-critical information systems.
Data backup is an important part of any disaster recovery plan. Data backup allows people to recover files and applications that are critical to continuing business. An effective data backup strategy should address the frequency of backup operations, the type of backup media, the time to run backups, automatic or manual backups, backup verification, storage, the person responsible for backups, and the backup personnel responsible for backups. Addressing the need for off-site storage may also be an important guide for organizations with broad business-critical data [Boswell ..., 2003 p. 433].
The organization must include comprehensive planning and testing and includes provisions for business continuity. Opponents are expected to be the first in the process. There are many things that need to be learned and corrected during the testing phase and need to be taken very seriously. Test exercises help reduce losses during actual attacks. An effective disaster recovery plan should include the following documents: a list of covered disasters, a list of disaster recovery team members, a business impact assessment, a business recovery and continuity plan, a backup document, and a recovery document.
It has been said that the most important step in managing potential weaknesses is to build a well-trained, ready-to-respond team, including senior management members, IT department members, facility management representatives and user representatives. A community affected by the crisis. In a real crisis, the disaster recovery team meets to assess and determine the source of the disaster and identify the key components affected. The team assesses the impact of the disaster on the business and estimates the time at which the disaster could disrupt business continuity. In the process, the cost of the disaster was also determined. It is also important to thoroughly document the changes that are implemented during the rush to resolve the issue.
Equally important, organizations demonstrate their commitment to these programs from the IS department by adopting well-defined security policies and HR policies that reflect their support for information security. A useful and well-written security policy should include acceptable use, privacy, due diligence, separation of duties, "need to know" issues, password management, service level agreements, and destruction or disposition of information and storage. Media [Boswell ..., 2003 p. 437]. Human resources policies involve personnel management. There should be many recruitment practices, including background, reference, and educational checks. In order to minimize security risks, employees should regularly review and rotate work functions and responsibilities, which is beneficial in an emergency situation due to a more even distribution of information. Employee termination practices are also important in protecting and preventing threats. The exit interview should be communicated, the individual should accompany the leave of the property, and the computer account and password of the terminated employee should be deactivated and changed. The code of ethics should also be included in the organization's human resources policy. This will help define and clarify the company's position in information security and provide a foundation based on ethics [Boswell ..., 2003 p. 441].
Incident response strategies can also play a key role. This policy covers how to handle after a security incident occurs. Following a reasonable incident response approach can reduce the likelihood of incompetent and inefficient behavior and help implement appropriate caution. The incident response strategy should follow the preparation steps [before the event occurs], detect [identify the result of the malicious code or where the file has been changed], control [to prevent further loss or interruption of the service], eradicate [eliminate the virus] or malicious Code as well as clean and reformat the affected hard drive, recover [restore the system] and follow up [develop a set of lessons] [Boswell ..., 2003 p. 442].
In summary, it is important to combine disaster recovery plans with well-defined and documented security policies, human resources policies, and incident response strategies that minimize the impact of catastrophic events and help ensure business continuity. It is said that "preparation failure is preparing to fail."
references
from
Boswell, S., Calvert, B., Campbell, P. [2003]. Security + Network Security Guide
from
Fundamental. Boston, MA: Thomson Stadium Technology.
Orignal From: Disaster recovery and business continuity
No comments:
Post a Comment