Àâòîðèçàöèÿ
Ïîèñê ïî óêàçàòåëÿì
Butterworth-Heinemann — Business Continuity and Disaster Recovery Planning for IT Professionals
Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå
Íàøëè îïå÷àòêó? Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter
Íàçâàíèå: Business Continuity and Disaster Recovery Planning for IT Professionals
Àâòîð: Butterworth-Heinemann
Àííîòàöèÿ: Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well.
As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially.
That is what Business Continuity Planning (BCP) is: a methodology used to create a plan for how an organization will recover after a disaster of various types. It takes into account both security and corporate risk management tatics.
There is a lot of movement around this initiative in the industry: the British Standards Institute is releasing a new standard for BCP this year. Trade shows are popping up covering the topic.
* Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental and technical hazards.
* Only published source of information on the new BCI standards and government requirements.
* Up dated information on recovery from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.
ßçûê:
Ðóáðèêà: Ðàçíîå /
Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö
ed2k: ed2k stats
Ãîä èçäàíèÿ: 2007
Êîëè÷åñòâî ñòðàíèö: 456
Äîáàâëåíà â êàòàëîã: 11.12.2007
Îïåðàöèè: Ïîëîæèòü íà ïîëêó |
Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
Ïðåäìåòíûé óêàçàòåëü
Interviews, for BIA 234—235
Inventory and BC/DR projects 101
Inventory, assessing critical processes, functions 230
ISO (International Standards Organization), data security best practices 48
IT (information technology), -specific risk management 143—144
IT (information technology), assessing critical processes, functions 228
IT (information technology), BC/DR planning challenges 379—380
IT (information technology), BC/DR project responsibilities 96—99
IT (information technology), BC/DR team 304—305
IT (information technology), dependencies, and BIA data points 238—243
IT (information technology), emergency recovery tasks 347—351 355
IT (information technology), risk mitigation strategies 278—280 290
IT (information technology), security, and the law 29—30
IT (information technology), system audits 381—384
IT (information technology), system changes, and BC/DR plan maintenance 394—395
IT project manager, reporting 86—87
JetBlue incident 103—104
Key man insurance 214
Labor disputes 170
Landslides 154—155
Law and IT security compromises 29—30
Law, legal liability for sensitive data loss 41
Law, legal, regulatory changes, and risk assessment 182
Laws, federal, regarding data security 48—50
Laws, privacy standards 24—25
Laws, state, regarding data security 45—48
Legal and business disruptions 237
Legal and Crisis Management Teams (CMTs) 345
Legal, affairs team 306
Legal, assessing critical processes, functions 228
Legal, changes, and BC/DR plan maintenance 396
Legal, data security obligations 44—50
Legal, department, and BC/DR projects 100—101
Licensing, IT recovery 287
Lifecycle, system development model 144—146
Lightning strikes 156—158
Limiting risk 265
Logistical components, BC/DR project 73—74
Logistics, and BC/DR projects 102
Logs, event 319—320 325—326 328
Loss exposure, and business disruptions 237
Losses, upstream and downstream 212—213
Maintenance of BC/DR plan 35 95 114 400—401 406
Maintenance, BC/DR change management 392—396
Maintenance, phase, BC/DR plans 302
Management role, BC/DR efforts 303—304
Managers as BC/DR plan stakeholders 78—79
Managing, BC/DR project progress 93
Managing, cross-functional teams 120
Managing, data access 30—31
Manufacturing, critical processes, functions 228—229
Marketing and sales and BC/DR projects 103
Marketing and sales, assessing critical processes, functions 229
Massachusetts’ notice of security breach laws 47—48
Matrix, NIST likelihood 192
Maximum Tolerable Downtime (MTD) 128 219—221 299 300
Media relations team 305—306
Meetings, BC/DR project team 85
Methodology, data collection 232—236
Methodology, threat assessment 186—195 203 205
Milestones, BC/DR project 62—63 94
Minor business processes, functions 218
Mirrored sites, recovery systems 282
Mission statement, BC/DR project 67
Mission-critical business processes, functions 216—217 221 291—292
Mitigation strategy development See also risk mitigation strategies
Mitigation strategy development, backup and recovery considerations 280—287
Mitigation strategy development, introduction to 34 210 262—263
Mobile sites, IT recovery 283
Monitoring, BC/DR training 366—367
Monitoring, changes, and BC/DR plan maintenance 397
MTD (maximum tolerable downtime) 219—221 299 300
NAS (network-attached storage) 285
National Flood Insurance Program 154
Natural hazards 18—20
Natural, environment threats See also specific threat
Natural, environment threats, types, and risk management 151—168
Network-attached storage (NAS) 285
Networks, emergency response 349—350
Nevada, earthquakes in 159—160
NIST (National Institute of Standards and Technology), business impact analysis purpose 211
NIST (National Institute of Standards and Technology), IT risk management 143—144
NIST (National Institute of Standards and Technology), likelihood matrix 192
Notice of security breach laws 46—48
Notification team 297
Notifications, change 396
Objectives of BC/DR projects 60
Objectives of IT risk management 144
Objectives, BC/DR training plan 362—363
Occupant emergency plans 77—78
Oil, disruption of supply 180—181
Operations and business disruptions 237
Operations and mitigation strategies 281
Operations, assessing critical processes, functions 229—230
Operations, assessment team 304
Operations, changes in, and BC/DR plan maintenance 395
Optimists and pessimists 17
Order fulfillment and business disruptions 126—127
Order fulfillment, assessing critical processes, functions 230
Organization, BC/DR project 75—89
Pandemics 165—168
Parametric estimates 70
People and risk mitigation strategies 278
People in BC/DR planning 6—7 20
People in risk assessment 141—142
People in vulnerability assessment 197
People, business continuity, BIA impacts 214—216
Personal data, state laws regarding security breach 47
Personal privacy threats 24
Personnel See employees
Pessimists and optimists 17
Petroleum, disruption of supply 180—181
Planning BC/DR projects 90—92
Planning business continuity See business continuity planning
Planning succession 214
plans See also specific plan
Plans, BC/DR project See BC/DR projects
Plans, BC/DR, creating and maintaining 31—35
Plans, emergency response 339—343 354—355
Politics, and BC/DR planning 73 74
Presentations, effectively formatting 56
Privacy standards, legislation 24—25
Processes and business impact analysis 212
Processes in BC/DR planning 7—9 16 40—42
Processes in risk assessment 142
Processes in vulnerability assessment 197—198
Processes, BC/DR project 85
Processes, change management, BC/DR projects 393
Processes, changes in, and BC/DR plan maintenance 397—398
Processes, criticality categories, recovery time 216—225
Processes, risk assessment overview 136—141
Processes, risk mitigation 266—273 289—290
Processes, training, testing, and auditing 376—378
Procurement team 307
Project initiation of BC/DR plan 33
Project management (PM), methodology 54
Project management (PM), process for BC/DR project 63
Project management (PM), project manager for BC/DR project 59
Project teams, BC/DR, forming 72—75
Project teams, BC/DR, meetings 86
Projects, BC/DR See BC/DR projects
Proposals for BC/DR projects 69
Public relations and BC/DR projects 103—105
Public relations and business disruptions 236
Public relations, crisis communications 332—336
Public relations, DC/DR communication plans 318—319
Public relations, media relations team 305—306
Public transportation disruption 180
Purchasing, and BC/DR projects 102
Qualitative threat assessment 191—195 203
Qualitative vulnerability assessment 199—201
Quality control, BC/DR projects 88—89
Quantitative threat assessment 187—191 203
Questionnaires for BIA 231 233—234
RAID (redundant arrays of inexpensive disks), IT recovery 284
Ranking BC/DR project requirements 110
Reciprocal sites, IT recovery 284
Records, mitigation strategy for critical 279
Recovery Point Objective (RPO) 219—221
Recovery Time Objective (RTO) 219—221 254
Recovery, disaster See disaster recovery
Recovery, emergency See emergency response recovery
Recovery, IT tasks 347—351
Recovery, mitigation strategy considerations 280—287 290
Recovery, phase, BC/DR plans 300
Recovery, requirements, options, for risk mitigation 267—269
Recovery, strategies 292
Recovery, time requirements, business impact analysis 218—225
Recovery, time requirements, risk mitigation 270
Regulatory, changes, and BC/DR plan maintenance 396
Regulatory, requirements and business disruptions 237
Reliable system design 32
Relocation team 305
Remote journaling, IT recovery 284
Replication, IT recovery 284—285
Reporting BC/DR project team 86—87
Reporting business impact analysis (BIA) report 252—253
Requirements, BC/DR projects 60—61 68 79—80
Research and BC/DR projects 101
Research, assessing critical processes, functions 230
Resource and logistics team 298
Resources, assigning in BC/DR plan 311—316
Resources, business continuity and disaster recovery planning 10
Resources, cyber crime 176—177
Resources, floods, and building standards 154
Resources, IT risk management 146—147
Resources, lightning safety 158
Resources, NIST document on IT risk management 143—144
Resources, NIST publication on BIAs 211
Resources, pandemics 167
Resources, weather phenomena 157
Resources, workplace violence 171
Return on investment (ROI), BC/DR training 364—365
Revenues, and business disruptions 125—130
Review phase, BC/DR plans 302
Risk assessment and business impact analysis 210
Risk assessment for BC/DR plan 33—34 107—109 112
Risk assessment, basics of 135—141 204
Risk assessment, components of 204—205
Risk assessment, human threat component 168—179
Risk assessment, infrastructure threat component 179—186
Risk assessment, introduction to 134—135
Risk assessment, manager 298
Risk assessment, natural, environment threat component 151—168
Risk assessment, people, process, and technology of 141—143
Risk assessment, summary of 202—206
Risk assessment, threat assessment methodology 138—139 186—195
Risk assessment, vulnerability assessment 195—201 206
Risk diagrams 188—190
Risk mitigation strategies See also mitigation strategy development
Risk mitigation strategies, developing 113 140—141 255 273—278
Risk mitigation strategies, people, buildings, infrastructure 278
Risk mitigation strategies, process of 266—273 289—290
Risk mitigation strategies, types of 263—266 288
risk transference 213 265—266 345
ROI (return on investment) on BC/DR training 364—365
RPO (recovery point objective) 219—221
RTO (recovery time objective) 219—221 254
Sabotage, and risk assessment 168—169 178
Sales and marketing and BC/DR projects 103
Sales and marketing, assessing critical processes, functions 229
Sales of BC/DR services 316
Sales, financial aspects of business disruptions 126
SAN (storage area network) 285
Schedules, BC/DR projects 80—84 92
Scheduling BC/DR projects 62—63
Scheduling of BC/DR training 365—366
Scope, BC/DR project 61—62 91
SDLC (system development lifecycle) model 144—146 207—208
Security and BC/DR projects 99—100
Security, assessing critical processes, functions 226—227
Security, audits, performing 381—384
security, data See data security
Security, HIPAA compliance 26
Senate Bill 1789 (proposed), data security 49—50
Service level agreements (SLA), recovery 271—272
Shareholders, DC/DR communication plans 318
Shelter-in-place 77
Shipping, critical processes, functions 230
Single point of failure 32
SLA (service level agreements), recovery 271—272
Small companies, backup and recovery solutions 291
Small companies, crisis management, training 357
Small companies, cross-training for BC/DR teams 364
Small companies, example of BIA for 245—251
Small companies, need for BC/DR plan 64
Small companies, small plans 329
SMEs (subject matter experts) 231
Software Engineering Institute (SEI) and CERT 349—350
Software piracy 169
Software, IT recovery 287
Sponsors, BC/DR project 71—72
Spot inspections 28
Stakeholders in BC/DR plan 78—79
Standards, privacy 24—25
State laws regarding data security 45—48
Storage area network (SAN) 285
Storms, winter and electrical 155—158
Subject matter experts (SMEs) 231
Succession planning 214
Suppliers and business disruptions 236
Suppliers, BC/DR services 308—309
Supplies, procurement team 307
System design, reliable, single point of failure 32
System development lifecycle (SDLC) model 144—146 208
System recovery time 219—221
Systems, critical, mitigation strategy for 279—280
Systems, IT risk management 147—148
Tasks, defining BC/DR 311—316
Teams and BC/DR training 371
Teams, activating BC/DR 297—298
Teams, BC/DR project 72—75 330
Teams, computer incident response team (CIRT) 347—351
Teams, crisis management team (CMT) 343—346 355
Teams, defining BC/DR 302—311 325—326
Teams, guidelines for BC/DR 307—309
Technical requirements, BC/DR projects 106 110—111
Technical specialties in BC/DR plan 73—74
Technological hazards 22—23
Technology in BC/DR planning 9—10 16—17
Technology in risk assessment 142—143
Technology in vulnerability assessment 198
Terrorism and risk assessment 171—172
Testing and training and auditing activities 360—361
Testing BC/DR plans 35 113—114 367—375 384—388 393—394
Testing, crisis communications 335—336
Theft and risk assessment 168—169
Theft, insider 27—30
Threat assessment See also specific threat
Threat assessment in risk assessment 138—139
Threat assessment, methodology 186—195 203 205
Threat assessment, quantitative 187—191
threats See also hazards
Threats and threat sources 161
Threats, checklist for 182—184
Threats, cyber 174—179
Threats, electronic data 23—31
Threats, human 168—179
Tidal waves 164
Tornados 162
Ðåêëàìà