Àâòîðèçàöèÿ 
		         
		        
					
 
		          
		        
			          
		        
			        Ïîèñê ïî óêàçàòåëÿì 
		         
		        
			        
					 
		          
		        
			          
			
			         
       		 
			          
                
                    
                        
                     
                  
		
			          
		        
			          
		
            
	     
	    
	    
            
		
                    Butterworth-Heinemann — Business Continuity and Disaster Recovery Planning for IT Professionals 
                  
                
                    
                        
                            
                                
                                    Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå    Íàøëè îïå÷àòêó? 
 
                                
                                    Íàçâàíèå:   Business Continuity and Disaster Recovery Planning for IT ProfessionalsÀâòîð:   Butterworth-Heinemann  Àííîòàöèÿ:  Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. 
ßçûê:  Ðóáðèêà:  Ðàçíîå /Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ:  Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö ed2k:   ed2k stats Ãîä èçäàíèÿ:  2007Êîëè÷åñòâî ñòðàíèö:  456Äîáàâëåíà â êàòàëîã:  11.12.2007Îïåðàöèè:  Ïîëîæèòü íà ïîëêó  |
	 
	Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà  | Ñêîïèðîâàòü ID 
                                 
                             
                        
                     
                 
                                                                
			          
                
                    Ïðåäìåòíûé óêàçàòåëü 
                  
                
                    
                        Interviews, for BIA 234—235 Inventory and BC/DR projects 101 Inventory, assessing critical processes, functions 230 ISO (International Standards Organization), data security best practices 48 IT (information technology), -specific risk management 143—144 IT (information technology), assessing critical processes, functions 228 IT (information technology), BC/DR planning challenges 379—380 IT (information technology), BC/DR project responsibilities 96—99 IT (information technology), BC/DR team 304—305 IT (information technology), dependencies, and BIA data points 238—243 IT (information technology), emergency recovery tasks 347—351 355 IT (information technology), risk mitigation strategies 278—280 290 IT (information technology), security, and the law 29—30 IT (information technology), system audits 381—384 IT (information technology), system changes, and BC/DR plan maintenance 394—395 IT project manager, reporting 86—87 JetBlue incident 103—104 Key man insurance 214 Labor disputes 170 Landslides 154—155 Law and IT security compromises 29—30 Law, legal liability for sensitive data loss 41 Law, legal, regulatory changes, and risk assessment 182 Laws, federal, regarding data security 48—50 Laws, privacy standards 24—25 Laws, state, regarding data security 45—48 Legal and business disruptions 237 Legal and Crisis Management Teams (CMTs) 345 Legal, affairs team 306 Legal, assessing critical processes, functions 228 Legal, changes, and BC/DR plan maintenance 396 Legal, data security obligations 44—50 Legal, department, and BC/DR projects 100—101 Licensing, IT recovery 287 Lifecycle, system development model 144—146 Lightning strikes 156—158 Limiting risk 265 Logistical components, BC/DR project 73—74 Logistics, and BC/DR projects 102 Logs, event 319—320 325—326 328 Loss exposure, and business disruptions 237 Losses, upstream and downstream 212—213 Maintenance of BC/DR plan 35 95 114 400—401 406 Maintenance, BC/DR change management 392—396 Maintenance, phase, BC/DR plans 302 Management role, BC/DR efforts 303—304 Managers as BC/DR plan stakeholders 78—79 Managing, BC/DR project progress 93 Managing, cross-functional teams 120 Managing, data access 30—31 Manufacturing, critical processes, functions 228—229 Marketing and sales and BC/DR projects 103 Marketing and sales, assessing critical processes, functions 229 Massachusetts’ notice of security breach laws 47—48 Matrix, NIST likelihood 192 Maximum Tolerable Downtime (MTD) 128 219—221 299 300 Media relations team 305—306 Meetings, BC/DR project team 85 Methodology, data collection 232—236 Methodology, threat assessment 186—195 203 205 Milestones, BC/DR project 62—63 94 Minor business processes, functions 218 Mirrored sites, recovery systems 282 Mission statement, BC/DR project 67 Mission-critical business processes, functions 216—217 221 291—292 Mitigation strategy development See also risk mitigation strategies Mitigation strategy development, backup and recovery considerations 280—287 Mitigation strategy development, introduction to 34 210 262—263 Mobile sites, IT recovery 283 Monitoring, BC/DR training 366—367 Monitoring, changes, and BC/DR plan maintenance 397 MTD (maximum tolerable downtime) 219—221 299 300 NAS (network-attached storage) 285 National Flood Insurance Program 154 Natural hazards 18—20 Natural, environment threats See also specific threat Natural, environment threats, types, and risk management 151—168 Network-attached storage (NAS) 285 Networks, emergency response 349—350 Nevada, earthquakes in 159—160 NIST (National Institute of Standards and Technology), business impact analysis purpose 211 NIST (National Institute of Standards and Technology), IT risk management 143—144 NIST (National Institute of Standards and Technology), likelihood matrix 192 Notice of security breach laws 46—48 Notification team 297 Notifications, change 396 Objectives of BC/DR projects 60 Objectives of IT risk management 144 Objectives, BC/DR training plan 362—363 Occupant emergency plans 77—78 Oil, disruption of supply 180—181 Operations and business disruptions 237 Operations and mitigation strategies 281 Operations, assessing critical processes, functions 229—230 Operations, assessment team 304 Operations, changes in, and BC/DR plan maintenance 395 Optimists and pessimists 17 Order fulfillment and business disruptions 126—127 Order fulfillment, assessing critical processes, functions 230 Organization, BC/DR project 75—89 Pandemics 165—168 Parametric estimates 70 People and risk mitigation strategies 278 People in BC/DR planning 6—7 20 People in risk assessment 141—142 People in vulnerability assessment 197 People, business continuity, BIA impacts 214—216 Personal data, state laws regarding security breach 47 Personal privacy threats 24 Personnel See employees Pessimists and optimists 17 Petroleum, disruption of supply 180—181 Planning BC/DR projects 90—92 Planning business continuity See business continuity planning Planning succession 214 plans See also specific plan Plans, BC/DR project See BC/DR projects Plans, BC/DR, creating and maintaining 31—35 Plans, emergency response 339—343 354—355 Politics, and BC/DR planning 73 74 Presentations, effectively formatting 56 Privacy standards, legislation 24—25 Processes and business impact analysis 212 Processes in BC/DR planning 7—9 16 40—42 Processes in risk assessment 142 Processes in vulnerability assessment 197—198 Processes, BC/DR project 85 Processes, change management, BC/DR projects 393 Processes, changes in, and BC/DR plan maintenance 397—398 Processes, criticality categories, recovery time 216—225 Processes, risk assessment overview 136—141 Processes, risk mitigation 266—273 289—290 Processes, training, testing, and auditing 376—378 Procurement team 307 Project initiation of BC/DR plan 33 Project management (PM), methodology 54 Project management (PM), process for BC/DR project 63 Project management (PM), project manager for BC/DR project 59 Project teams, BC/DR, forming 72—75 Project teams, BC/DR, meetings 86 Projects, BC/DR See BC/DR projects Proposals for BC/DR projects 69 Public relations and BC/DR projects 103—105 Public relations and business disruptions 236 Public relations, crisis communications 332—336 Public relations, DC/DR communication plans 318—319 Public relations, media relations team 305—306 Public transportation disruption 180 Purchasing, and BC/DR projects 102 Qualitative threat assessment 191—195 203 Qualitative vulnerability assessment 199—201 Quality control, BC/DR projects 88—89 Quantitative threat assessment 187—191 203 Questionnaires for BIA 231 233—234 RAID (redundant arrays of inexpensive disks), IT recovery 284 Ranking BC/DR project requirements 110 Reciprocal sites, IT recovery 284 Records, mitigation strategy for critical 279 Recovery Point Objective (RPO) 219—221 Recovery Time Objective (RTO) 219—221 254 Recovery, disaster See disaster recovery Recovery, emergency See emergency response recovery Recovery, IT tasks 347—351 Recovery, mitigation strategy considerations 280—287 290 Recovery, phase, BC/DR plans 300 Recovery, requirements, options, for risk mitigation 267—269 Recovery, strategies 292 Recovery, time requirements, business impact analysis 218—225 Recovery, time requirements, risk mitigation 270 Regulatory, changes, and BC/DR plan maintenance 396 Regulatory, requirements and business disruptions 237 Reliable system design 32 Relocation team 305 Remote journaling, IT recovery 284 Replication, IT recovery 284—285 Reporting BC/DR project team 86—87 Reporting business impact analysis (BIA) report 252—253 Requirements, BC/DR projects 60—61 68 79—80 Research and BC/DR projects 101 Research, assessing critical processes, functions 230 Resource and logistics team 298 Resources, assigning in BC/DR plan 311—316 Resources, business continuity and disaster recovery planning 10 Resources, cyber crime 176—177 Resources, floods, and building standards 154 Resources, IT risk management 146—147 Resources, lightning safety 158 Resources, NIST document on IT risk management 143—144 Resources, NIST publication on BIAs 211 Resources, pandemics 167 Resources, weather phenomena 157 Resources, workplace violence 171 Return on investment (ROI), BC/DR training 364—365 Revenues, and business disruptions 125—130 Review phase, BC/DR plans 302 Risk assessment and business impact analysis 210 Risk assessment for BC/DR plan 33—34 107—109 112 Risk assessment, basics of 135—141 204 Risk assessment, components of 204—205 Risk assessment, human threat component 168—179 Risk assessment, infrastructure threat component 179—186 Risk assessment, introduction to 134—135 Risk assessment, manager 298 Risk assessment, natural, environment threat component 151—168 Risk assessment, people, process, and technology of 141—143 Risk assessment, summary of 202—206 Risk assessment, threat assessment methodology 138—139 186—195 Risk assessment, vulnerability assessment 195—201 206 Risk diagrams 188—190 Risk mitigation strategies See also mitigation strategy development Risk mitigation strategies, developing 113 140—141 255 273—278 Risk mitigation strategies, people, buildings, infrastructure 278 Risk mitigation strategies, process of 266—273 289—290 Risk mitigation strategies, types of 263—266 288 risk transference 213 265—266 345 ROI (return on investment) on BC/DR training 364—365 RPO (recovery point objective) 219—221 RTO (recovery time objective) 219—221 254 Sabotage, and risk assessment 168—169 178 Sales and marketing and BC/DR projects 103 Sales and marketing, assessing critical processes, functions 229 Sales of BC/DR services 316 Sales, financial aspects of business disruptions 126 SAN (storage area network) 285 Schedules, BC/DR projects 80—84 92 Scheduling BC/DR projects 62—63 Scheduling of BC/DR training 365—366 Scope, BC/DR project 61—62 91 SDLC (system development lifecycle) model 144—146 207—208 Security and BC/DR projects 99—100 Security, assessing critical processes, functions 226—227 Security, audits, performing 381—384 security, data See data security Security, HIPAA compliance 26 Senate Bill 1789 (proposed), data security 49—50 Service level agreements (SLA), recovery 271—272 Shareholders, DC/DR communication plans 318 Shelter-in-place 77 Shipping, critical processes, functions 230 Single point of failure 32 SLA (service level agreements), recovery 271—272 Small companies, backup and recovery solutions 291 Small companies, crisis management, training 357 Small companies, cross-training for BC/DR teams 364 Small companies, example of BIA for 245—251 Small companies, need for BC/DR plan 64 Small companies, small plans 329 SMEs (subject matter experts) 231 Software Engineering Institute (SEI) and CERT 349—350 Software piracy 169 Software, IT recovery 287 Sponsors, BC/DR project 71—72 Spot inspections 28 Stakeholders in BC/DR plan 78—79 Standards, privacy 24—25 State laws regarding data security 45—48 Storage area network (SAN) 285 Storms, winter and electrical 155—158 Subject matter experts (SMEs) 231 Succession planning 214 Suppliers and business disruptions 236 Suppliers, BC/DR services 308—309 Supplies, procurement team 307 System design, reliable, single point of failure 32 System development lifecycle (SDLC) model 144—146 208 System recovery time 219—221 Systems, critical, mitigation strategy for 279—280 Systems, IT risk management 147—148 Tasks, defining BC/DR 311—316 Teams and BC/DR training 371 Teams, activating BC/DR 297—298 Teams, BC/DR project 72—75 330 Teams, computer incident response team (CIRT) 347—351 Teams, crisis management team (CMT) 343—346 355 Teams, defining BC/DR 302—311 325—326 Teams, guidelines for BC/DR 307—309 Technical requirements, BC/DR projects 106 110—111 Technical specialties in BC/DR plan 73—74 Technological hazards 22—23 Technology in BC/DR planning 9—10 16—17 Technology in risk assessment 142—143 Technology in vulnerability assessment 198 Terrorism and risk assessment 171—172 Testing and training and auditing activities 360—361 Testing BC/DR plans 35 113—114 367—375 384—388 393—394 Testing, crisis communications 335—336 Theft and risk assessment 168—169 Theft, insider 27—30 Threat assessment See also specific threat Threat assessment in risk assessment 138—139 Threat assessment, methodology 186—195 203 205 Threat assessment, quantitative 187—191 threats See also hazards Threats and threat sources 161 Threats, checklist for 182—184 Threats, cyber 174—179 Threats, electronic data 23—31 Threats, human 168—179 Tidal waves 164 Tornados 162 
                            
                     
                  
			Ðåêëàìà