Week 3 Security Policies Part 1
Week 3 Security Policies Part 1
Procedures
This Chapter:
• Understanding Business continuity
• Summarize the various authentication models and identify the
components of each
• Execute proper logging procedures and evaluate the results
• Conduct periodic audits of system security settings
• Explain redundancy planning and its components.
• Implement disaster recovery procedures
• Identify and explain applicable legislation and organizational policies.
Understanding Business Continuity
• Utilities
• Water, Electricity
• To keep it comfortable and functioning properly
• High Availability
• The process of keeping services and systems operational during an outage
Understanding Business Continuity
• Redundancy
• Redundancy refers to systems that are either duplicated or that fail over to
other systems in the event of a malfunction.
• Spare Parts
• Always be readily available to repair any system critical component if it should
fail.
• Electrical Power
Redundant Array of Independent Disks
• Redundant Array of Independent Disks to be discussed next meeting.
Redundant Array of Independent Disks
Depending on Backups
• Backups are duplicate copies of key information, ideally stored in a
location other than the one where the information is currently stored.
Primary starting point for disaster recovery
• Financial Statements
• Incorporation Documents
• Loan Documents
• Personnel Information
• Tax Record
• Board Resolution
Primary starting point for disaster recovery
• Applications
• Appointment Files
• Customer List
• Database Files
• Email correspondence
• Financial Data
• User Files
• User Information
You might need to restore information from backup copies for any
number of reasons. Some of the more common reasons are listed
here:
• Accidental Deletion
• Applications Errors
• Natural Disasters
• Physical Attacks
• Server Failure
• Virus Infection
• Workstation Failure
• Working copies - Working copy backups—sometimes referred to as
shadow copies—are partial or full backups that are kept at the
computer center for immediate recovery purposes. Working copies
are frequently the most recent backups that have been made.