Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Butterworth-Heinemann — Business Continuity and Disaster Recovery Planning for IT Professionals
Butterworth-Heinemann — Business Continuity and Disaster Recovery Planning for IT Professionals



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Business Continuity and Disaster Recovery Planning for IT Professionals

Àâòîð: Butterworth-Heinemann

Àííîòàöèÿ:

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well.

As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially.

That is what Business Continuity Planning (BCP) is: a methodology used to create a plan for how an organization will recover after a disaster of various types. It takes into account both security and corporate risk management tatics.

There is a lot of movement around this initiative in the industry: the British Standards Institute is releasing a new standard for BCP this year. Trade shows are popping up covering the topic.

* Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental and technical hazards.
* Only published source of information on the new BCI standards and government requirements.
* Up dated information on recovery from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.


ßçûê: en

Ðóáðèêà: Ðàçíîå/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2007

Êîëè÷åñòâî ñòðàíèö: 456

Äîáàâëåíà â êàòàëîã: 11.12.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
Interviews, for BIA      234—235
Inventory and BC/DR projects      101
Inventory, assessing critical processes, functions      230
ISO (International Standards Organization), data security best practices      48
IT (information technology), -specific risk management      143—144
IT (information technology), assessing critical processes, functions      228
IT (information technology), BC/DR planning challenges      379—380
IT (information technology), BC/DR project responsibilities      96—99
IT (information technology), BC/DR team      304—305
IT (information technology), dependencies, and BIA data points      238—243
IT (information technology), emergency recovery tasks      347—351 355
IT (information technology), risk mitigation strategies      278—280 290
IT (information technology), security, and the law      29—30
IT (information technology), system audits      381—384
IT (information technology), system changes, and BC/DR plan maintenance      394—395
IT project manager, reporting      86—87
JetBlue incident      103—104
Key man insurance      214
Labor disputes      170
Landslides      154—155
Law and IT security compromises      29—30
Law, legal liability for sensitive data loss      41
Law, legal, regulatory changes, and risk assessment      182
Laws, federal, regarding data security      48—50
Laws, privacy standards      24—25
Laws, state, regarding data security      45—48
Legal and business disruptions      237
Legal and Crisis Management Teams (CMTs)      345
Legal, affairs team      306
Legal, assessing critical processes, functions      228
Legal, changes, and BC/DR plan maintenance      396
Legal, data security obligations      44—50
Legal, department, and BC/DR projects      100—101
Licensing, IT recovery      287
Lifecycle, system development model      144—146
Lightning strikes      156—158
Limiting risk      265
Logistical components, BC/DR project      73—74
Logistics, and BC/DR projects      102
Logs, event      319—320 325—326 328
Loss exposure, and business disruptions      237
Losses, upstream and downstream      212—213
Maintenance of BC/DR plan      35 95 114 400—401 406
Maintenance, BC/DR change management      392—396
Maintenance, phase, BC/DR plans      302
Management role, BC/DR efforts      303—304
Managers as BC/DR plan stakeholders      78—79
Managing, BC/DR project progress      93
Managing, cross-functional teams      120
Managing, data access      30—31
Manufacturing, critical processes, functions      228—229
Marketing and sales and BC/DR projects      103
Marketing and sales, assessing critical processes, functions      229
Massachusetts’ notice of security breach laws      47—48
Matrix, NIST likelihood      192
Maximum Tolerable Downtime (MTD)      128 219—221 299 300
Media relations team      305—306
Meetings, BC/DR project team      85
Methodology, data collection      232—236
Methodology, threat assessment      186—195 203 205
Milestones, BC/DR project      62—63 94
Minor business processes, functions      218
Mirrored sites, recovery systems      282
Mission statement, BC/DR project      67
Mission-critical business processes, functions      216—217 221 291—292
Mitigation strategy development      See also risk mitigation strategies
Mitigation strategy development, backup and recovery considerations      280—287
Mitigation strategy development, introduction to      34 210 262—263
Mobile sites, IT recovery      283
Monitoring, BC/DR training      366—367
Monitoring, changes, and BC/DR plan maintenance      397
MTD (maximum tolerable downtime)      219—221 299 300
NAS (network-attached storage)      285
National Flood Insurance Program      154
Natural hazards      18—20
Natural, environment threats      See also specific threat
Natural, environment threats, types, and risk management      151—168
Network-attached storage (NAS)      285
Networks, emergency response      349—350
Nevada, earthquakes in      159—160
NIST (National Institute of Standards and Technology), business impact analysis purpose      211
NIST (National Institute of Standards and Technology), IT risk management      143—144
NIST (National Institute of Standards and Technology), likelihood matrix      192
Notice of security breach laws      46—48
Notification team      297
Notifications, change      396
Objectives of BC/DR projects      60
Objectives of IT risk management      144
Objectives, BC/DR training plan      362—363
Occupant emergency plans      77—78
Oil, disruption of supply      180—181
Operations and business disruptions      237
Operations and mitigation strategies      281
Operations, assessing critical processes, functions      229—230
Operations, assessment team      304
Operations, changes in, and BC/DR plan maintenance      395
Optimists and pessimists      17
Order fulfillment and business disruptions      126—127
Order fulfillment, assessing critical processes, functions      230
Organization, BC/DR project      75—89
Pandemics      165—168
Parametric estimates      70
People and risk mitigation strategies      278
People in BC/DR planning      6—7 20
People in risk assessment      141—142
People in vulnerability assessment      197
People, business continuity, BIA impacts      214—216
Personal data, state laws regarding security breach      47
Personal privacy threats      24
Personnel      See employees
Pessimists and optimists      17
Petroleum, disruption of supply      180—181
Planning BC/DR projects      90—92
Planning business continuity      See business continuity planning
Planning succession      214
plans      See also specific plan
Plans, BC/DR project      See BC/DR projects
Plans, BC/DR, creating and maintaining      31—35
Plans, emergency response      339—343 354—355
Politics, and BC/DR planning      73 74
Presentations, effectively formatting      56
Privacy standards, legislation      24—25
Processes and business impact analysis      212
Processes in BC/DR planning      7—9 16 40—42
Processes in risk assessment      142
Processes in vulnerability assessment      197—198
Processes, BC/DR project      85
Processes, change management, BC/DR projects      393
Processes, changes in, and BC/DR plan maintenance      397—398
Processes, criticality categories, recovery time      216—225
Processes, risk assessment overview      136—141
Processes, risk mitigation      266—273 289—290
Processes, training, testing, and auditing      376—378
Procurement team      307
Project initiation of BC/DR plan      33
Project management (PM), methodology      54
Project management (PM), process for BC/DR project      63
Project management (PM), project manager for BC/DR project      59
Project teams, BC/DR, forming      72—75
Project teams, BC/DR, meetings      86
Projects, BC/DR      See BC/DR projects
Proposals for BC/DR projects      69
Public relations and BC/DR projects      103—105
Public relations and business disruptions      236
Public relations, crisis communications      332—336
Public relations, DC/DR communication plans      318—319
Public relations, media relations team      305—306
Public transportation disruption      180
Purchasing, and BC/DR projects      102
Qualitative threat assessment      191—195 203
Qualitative vulnerability assessment      199—201
Quality control, BC/DR projects      88—89
Quantitative threat assessment      187—191 203
Questionnaires for BIA      231 233—234
RAID (redundant arrays of inexpensive disks), IT recovery      284
Ranking BC/DR project requirements      110
Reciprocal sites, IT recovery      284
Records, mitigation strategy for critical      279
Recovery Point Objective (RPO)      219—221
Recovery Time Objective (RTO)      219—221 254
Recovery, disaster      See disaster recovery
Recovery, emergency      See emergency response recovery
Recovery, IT tasks      347—351
Recovery, mitigation strategy considerations      280—287 290
Recovery, phase, BC/DR plans      300
Recovery, requirements, options, for risk mitigation      267—269
Recovery, strategies      292
Recovery, time requirements, business impact analysis      218—225
Recovery, time requirements, risk mitigation      270
Regulatory, changes, and BC/DR plan maintenance      396
Regulatory, requirements and business disruptions      237
Reliable system design      32
Relocation team      305
Remote journaling, IT recovery      284
Replication, IT recovery      284—285
Reporting BC/DR project team      86—87
Reporting business impact analysis (BIA) report      252—253
Requirements, BC/DR projects      60—61 68 79—80
Research and BC/DR projects      101
Research, assessing critical processes, functions      230
Resource and logistics team      298
Resources, assigning in BC/DR plan      311—316
Resources, business continuity and disaster recovery planning      10
Resources, cyber crime      176—177
Resources, floods, and building standards      154
Resources, IT risk management      146—147
Resources, lightning safety      158
Resources, NIST document on IT risk management      143—144
Resources, NIST publication on BIAs      211
Resources, pandemics      167
Resources, weather phenomena      157
Resources, workplace violence      171
Return on investment (ROI), BC/DR training      364—365
Revenues, and business disruptions      125—130
Review phase, BC/DR plans      302
Risk assessment and business impact analysis      210
Risk assessment for BC/DR plan      33—34 107—109 112
Risk assessment, basics of      135—141 204
Risk assessment, components of      204—205
Risk assessment, human threat component      168—179
Risk assessment, infrastructure threat component      179—186
Risk assessment, introduction to      134—135
Risk assessment, manager      298
Risk assessment, natural, environment threat component      151—168
Risk assessment, people, process, and technology of      141—143
Risk assessment, summary of      202—206
Risk assessment, threat assessment methodology      138—139 186—195
Risk assessment, vulnerability assessment      195—201 206
Risk diagrams      188—190
Risk mitigation strategies      See also mitigation strategy development
Risk mitigation strategies, developing      113 140—141 255 273—278
Risk mitigation strategies, people, buildings, infrastructure      278
Risk mitigation strategies, process of      266—273 289—290
Risk mitigation strategies, types of      263—266 288
risk transference      213 265—266 345
ROI (return on investment) on BC/DR training      364—365
RPO (recovery point objective)      219—221
RTO (recovery time objective)      219—221 254
Sabotage, and risk assessment      168—169 178
Sales and marketing and BC/DR projects      103
Sales and marketing, assessing critical processes, functions      229
Sales of BC/DR services      316
Sales, financial aspects of business disruptions      126
SAN (storage area network)      285
Schedules, BC/DR projects      80—84 92
Scheduling BC/DR projects      62—63
Scheduling of BC/DR training      365—366
Scope, BC/DR project      61—62 91
SDLC (system development lifecycle) model      144—146 207—208
Security and BC/DR projects      99—100
Security, assessing critical processes, functions      226—227
Security, audits, performing      381—384
security, data      See data security
Security, HIPAA compliance      26
Senate Bill 1789 (proposed), data security      49—50
Service level agreements (SLA), recovery      271—272
Shareholders, DC/DR communication plans      318
Shelter-in-place      77
Shipping, critical processes, functions      230
Single point of failure      32
SLA (service level agreements), recovery      271—272
Small companies, backup and recovery solutions      291
Small companies, crisis management, training      357
Small companies, cross-training for BC/DR teams      364
Small companies, example of BIA for      245—251
Small companies, need for BC/DR plan      64
Small companies, small plans      329
SMEs (subject matter experts)      231
Software Engineering Institute (SEI) and CERT      349—350
Software piracy      169
Software, IT recovery      287
Sponsors, BC/DR project      71—72
Spot inspections      28
Stakeholders in BC/DR plan      78—79
Standards, privacy      24—25
State laws regarding data security      45—48
Storage area network (SAN)      285
Storms, winter and electrical      155—158
Subject matter experts (SMEs)      231
Succession planning      214
Suppliers and business disruptions      236
Suppliers, BC/DR services      308—309
Supplies, procurement team      307
System design, reliable, single point of failure      32
System development lifecycle (SDLC) model      144—146 208
System recovery time      219—221
Systems, critical, mitigation strategy for      279—280
Systems, IT risk management      147—148
Tasks, defining BC/DR      311—316
Teams and BC/DR training      371
Teams, activating BC/DR      297—298
Teams, BC/DR project      72—75 330
Teams, computer incident response team (CIRT)      347—351
Teams, crisis management team (CMT)      343—346 355
Teams, defining BC/DR      302—311 325—326
Teams, guidelines for BC/DR      307—309
Technical requirements, BC/DR projects      106 110—111
Technical specialties in BC/DR plan      73—74
Technological hazards      22—23
Technology in BC/DR planning      9—10 16—17
Technology in risk assessment      142—143
Technology in vulnerability assessment      198
Terrorism and risk assessment      171—172
Testing and training and auditing activities      360—361
Testing BC/DR plans      35 113—114 367—375 384—388 393—394
Testing, crisis communications      335—336
Theft and risk assessment      168—169
Theft, insider      27—30
Threat assessment      See also specific threat
Threat assessment in risk assessment      138—139
Threat assessment, methodology      186—195 203 205
Threat assessment, quantitative      187—191
threats      See also hazards
Threats and threat sources      161
Threats, checklist for      182—184
Threats, cyber      174—179
Threats, electronic data      23—31
Threats, human      168—179
Tidal waves      164
Tornados      162
1 2 3
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå