kamsis20142-15-business continuity - telkom...

23
Keamanan Sistem (CNG4O3) 2014-2 15 – Business Continuity

Upload: trinhquynh

Post on 28-Aug-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Keamanan Sistem (CNG4O3)

2014-2

15 – Business Continuity

• Business continuity can be defined as the ability of an organization to maintain its operations and services in the face of a disruptive event

• natural (flood, hurricane, earthquake, and so on)

• man-made (plane crash, terrorist attack, denial-of-service attack, and so on)

• Business continuity planning and testing is the process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient

• Succession planning, or determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees

• Business Impact Analysis (BIA)

Disaster Recovery

• Focuses on restoring computing and technology resources to their former state � mean time to restore (MTTR).

• Typically include procedures to address redundancyand fault tolerance as well as data backups.

Disaster Recovery Plan - common features

1. Purpose and Scope: • the reason for the plan and what it encompasses

2. Recovery Team

3. Preparing for a Disaster • lists the entities that could impact an organization and also

the procedures and safeguards that should constantly be in force to reduce the risk of the disaster

4. Emergency Procedures• answers the question, “ What should happen when a disaster

occurs?”

5. Restoration Procedures• how to fully recover from the disaster and return to normal

business operations

A DR plan illustrating the chronology of the RPO and the RTO with respect to the MI.

• Recovery Time Objective (RTO) • the age of files that must be recovered from backup

storage for normal operations to resume

• Recovery Point Objective (RPO)• the maximum acceptable amount of data loss measured

in time

http://en.wikipedia.org/wiki/Disaster_recovery_plan

High Availability

Redundancy planning -- server

• Asymmetric

• a standby server exists only to take over for another server in the event of its failure

• Symmetric

• If one server fails, the remaining servers continue to perform their normal work as well as that of the failed server

Redundancy planning -- storage

• Statistical measure: mean time between failures (MTBF) � the number of spare hard drives needed

• Redundant Array of Independent Drives (RAID)

• By software of hardware

Redundancy planning

• Network• A redundant network “waits” in the background during

normal operations and uses a replication scheme to keep its copy of the live network information current

• Power• uninterruptible power supply (UPS): offline, online

• backup generator

• Sites• hot sites: essentially a duplicate of the production site and

has all the equipment needed for an organization to continue running

• cold sites: provides office space

• warm sites: has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data

Data backup

http://continuous-data-backup-review.toptenreviews.com/

CDP – patented

http://www.google.com/patents/US5086502

Seven tiers of disaster recovery

http://www.redbooks.ibm.com/redbooks/pdfs/sg246844.pdf

http://www.redbooks.ibm.com/redbooks/pdfs/sg246844.pdf

http://www.redbooks.ibm.com/redbooks/pdfs/sg246844.pdf

Tier 7: Highly automated, business integrated solution

• include all the major components being used for a Tier 6 solution with the additional integration of automation.

• This allows a Tier 7 solution to ensure consistency of data above that which is granted by Tier 6 solutions.

• Additionally, recovery of the applications is automated, allowing for restoration of systems and applications much faster and more reliably than would be possible through manual business continuity procedures.

http://en.wikipedia.org/wiki/Seven_tiers_of_disaster_recovery

http://recoveryspecialties.com/7-tiers.html

“An ounce of prevention is worth a

pound of cure”

Computer Forensics

• Using technology to search for computer evidence of a crime;

• Attempt to retrieve information—even if it has been altered or erased—that can be used in the pursuit of the attacker or criminal

• Four basic steps:

1. secure the crime scene

2. collect the evidence

3. establish a chain of custody

4. examine the evidence

When you write your ‘Learning Continuity Plan’, what will it look like?

Business continuity planning : the process of

identifying exposure to threats, creating

preventive and recovery procedures