0% found this document useful (0 votes)
16 views

GHJJJJ

A formal data backup and recovery strategy is important for businesses to continue operating even when facing unexpected data loss or damage. Threats to data such as phishing, ransomware, user error, and natural disasters are on the rise. An effective backup management policy should address the frequency of backups, retention period, backup media and storage, monitoring, and testing of restoration to ensure critical business data is properly backed up.

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

GHJJJJ

A formal data backup and recovery strategy is important for businesses to continue operating even when facing unexpected data loss or damage. Threats to data such as phishing, ransomware, user error, and natural disasters are on the rise. An effective backup management policy should address the frequency of backups, retention period, backup media and storage, monitoring, and testing of restoration to ensure critical business data is properly backed up.

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Operational Controls

Importance of Data Backup and Recovery


 A smart data backup and recovery strategy can keep your business up and running,
even when the unexpected occurs.

Data Backup and Recovery


 Backing up your data entails making and storing copies of your business information.
This includes application and product data, customer files, employee and supplier
records, and competitive research. Recovery means taking those copies and restoring
data when the original information has been lost or damaged.

Threats to that data


 Threats to that data are on the rise. Phishing, ransomware, and other malicious attacks
can wreak havoc on your ability to operate and result in financially devastating data
loss.
 Attacks aren’t the only threat to data. Simple user error can cause critical data loss.
Natural disasters such as hurricanes, floods, or fires can also disrupt power and damage
data.

What is Backup Management?


 Existence of a Formal Backup Policy addressing the following aspects:-
o Frequency of backup and test restoration
o Retention period of backups
o Type and labeling of backup media used
o Monitoring of backup jobs
 Access to backup job scheduling should be restricted to only authorized IT personnel.
 Successful backup of business critical data should be performed according to the Backup
Policy. In case of failure, timely rerun of backups has to be performed.
 Periodic monitoring of backup jobs
 Backup restoration must be carried out periodically, as per the policy.
 Backup media should be stored at an offsite location

IT Operations
The primary role of the Computer Operations function is to provide ongoing support to the
business. They are tasked with ensuring that previous days' business data is processed in a
complete and timely manner and ensuring that critical IT functions are available and fully
functional for start-of-day business activities. Specifically, they perform the following functions:
 Performance and capacity monitoring.
 Scheduling for production batch jobs.
 Data Management - backup, restoration, disaster recovery.
 IT Support - problem and incidence management

Computer Processing
 The two main methods of computer processing are batch and online. An organization
can use either or a combination of both.
 Batch processing is characterized by multiple updates to business data being processed
at once, usually overnight. The successful completion of the overnight process is critical
to the start-of-day business processes
 Online processing is characterized by updates to business data being processed on a
transaction by transaction basis, usually immediately or in real-time.' Users are able to
directly interface with business users. The on going availability of the environment is
critical to business processes it supports
Both have unique risks and controls; poor controls could impact the availability of systems and
integrity of information.

Scheduling
 The critical nature of the batch cycle requires robust scheduling processes and controls.
 Scheduling tools and their underlying security help to ensure the availability and
integrity of information.
 Good controls over scheduling include:
✓ A defined and communicated process for scheduling batch jobs, including adding
new jobs and modifying existing jobs
✓ Documentation of the job schedule and overall monitoring process Procedures for
escalating problems with the batch job cycle

You might also like