Course Title: Disaster Recovery, 1st Edition

Size: px
Start display at page:

Download "Course Title: Disaster Recovery, 1st Edition"

Transcription

1 Course Title: Disaster Recovery, 1st Edition Page 1 of 8

2 Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised of two books that are designed to fortify disaster recovery preparation and virtualization technology knowledge of information security students, system administrators, systems engineers, enterprise system architects, and any IT professional who is concerned about the integrity of their network infrastructure. Topics include disaster recovery planning, risk control policies and countermeasures, disaster recovery tools and services, and virtualization principles. The series when used in its entirety helps prepare readers to take and succeed on the E CDR and E CVT, Disaster Recovery and Virtualization Technology certification exam from EC- Council. The EC-Council Certified Disaster Recovery and Virtualization Technology professional will have a better understanding of how to set up disaster recovery plans using traditional and virtual technologies to ensure business continuity in the event of a disaster. Certificate Info Disaster Recovery Who Should Attend? This course will significantly benefit Network administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. Course Duration: 2 days (9:00 5:00) CPE/ECE Qualification 16 ECE Credits awarded for attendance (1 for each classroom hour) Suggested Retail: $799 USD Page 2 of 8

3 Required Courseware: Visit and click on Training Workshops for ordering details. What s included? Physical Courseware 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate Course + Supplement Cost: See the Training Workshops section at for current pricing information. Related Certificates: VIRTUALIZATION SECURITY Page 3 of 8

4 Course Briefing: 1. Introduction to Disaster Recovery and Business Continuity According to Disaster Recovery is the ability of an organization to respond to a disaster or an interruption in services by implementing a disaster recovery plan to stabilize and restore the organization s critical functions. This module gives a brief introduction to the concepts, such as, disaster recovery, levels of data recovery, disaster recovery process, and business continuity. It also focuses on the concept of Business Continuity planning that helps to provide security and resilience to the organization. It mainly focuses on the topics, such as, how to be prepared before a disaster occurs and how to avoid disasters. 2. Laws and Acts This module familiarizes with some of the laws and acts pertaining to disaster recovery such as, Applicable Acts in Disaster Recovery, Acts of U.S: Sarbanes-Oxley Act, Gramm-Leach-Bliley Act, HIPAA, Flood Disaster Protection Act of 1973, Robert T. Stafford Disaster Relief and Emergency Assistance Act and CAN SPAM Act 2003, etc. 3. Disaster Recovery Planning and Implementation A disaster recovery plan (DRP) describes how an organization should deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken so that the effects of a disaster will be minimized and the organization will be able to either maintain or quickly resume mission-critical functions. Typically, a disaster recovery planning involves an analysis of business processes and continuity needs; it may also include a significant focus on disaster prevention. These modules describe the various steps for planning a disaster recovery process, mainly concentrating on the topics, such as, identifying and estimating the risks, defining a recovery strategy, and performing risk assessments and audits. Disaster recovery planning in a virtualized environment topic is also discussed in this module. It also familiarizes with ten tips for successful IT disaster recovery planning. 4. Business Continuity Management A business continuity plan should provide an enterprise-wide risk-based approach, covering people, processes, technology, and extended enterprise to ensure the continuing availability of the business support systems and minimize the disruption risks. This module mainly focuses on the elements of business continuity management and how to develop business continuity strategies. It also highlights the topics, such as, crisis communication plan, emergency response plan, and business continuity plan development, implementing and maintaining the plan. 5. Managing, Assessing, and Evaluating Risks This module familiarizes with the importance of risk management, risk assessment, and risk mitigation. It also displays the keys for successful risk management program mainly focusing on the roles and responsibilities of the risk management team. It also familiarizes with all the risk variables, relative threats, vulnerabilities, attacks, and consequences related to the system. This module describes about the threats that may result in disclosure of the asset, modification of the asset, Page 4 of 8

5 destruction or loss of the asset, the hardware it resides upon or the software that interacts with it, and interruption of the access to the asset. This module also covers the topics, such as, risk assessment methodology, threat analysis, vulnerability analysis, and vulnerability assessment methodologies Risk management methodology process contains threat and vulnerability analysis. This process is used to find the vulnerabilities and threats to improve the system s performance. This module familiarizes with the topics, such as, system disposition/reutilization, system administration, and audit mechanism processes, system acquisition, process of selecting and purchasing new IT, security product integration, maintenance of user accounts. It also highlights the processes for timely deletion of accounts, automated tool for security test, and security test and evaluation plan and procedure. 6. Risk Control Policies and Countermeasures System security policy provides the guideline for each user to be provided a separate account to use a computer system, containing the password with minimum of six characters. This module helps the students in understanding the security policies and procedures implemented during risk analysis/assessment process. It mainly focuses on the topics, such as, general control policies, information security policy, and system acquisitions policies and procedures. 7. Data Storage Technologies This module talks about various data storage technologies. It discusses the topics, such as, DAS, NAS or SAN, NAS disk-as-disk targets, backup of NAS servers and scalable NAS. It mainly focuses on implementation services for network attached storage systems, highlighting the benefits of network attached storage in small and mid-sized business networks It also familiarizes with the topics, such as what is SAN, threats to a SAN, the benefits of SANs, and the technical topology of a SAN. It mainly focuses on the SAN security concerns. It also highlights the topics securing storage area networks with iscsi and storage area networks over fibre channels. 8. Disaster Recovery Services and Tools Disaster recovery services and software are fetching more significant aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are more things that can go wrong. As a consequence, recovery plans have also become more complex. This module familiarizes with the topics, such as, disaster recovery services and their needs, types of disaster recovery services, data loss prevention, etc. It explains the terminology of implementing offsite backup with the understanding of identifying backup requirements and its importance. It focuses on the topics such as, advantages of offsite data backup, tips for keeping data safe, and developing an effective data backup strategy. It highlights the list of disaster recovery service providers, will familiarize with various backup and recovery solutions, such as, Symantec Backup Exec System Recovery, Symantec Backup Exec, AmeriVault-EV, MozyPro, PC BackUp Pro, SyncBack Pro, etc. 9. Certification and Accreditation of Information Systems System certifiers and accreditors assess the security assessment results credibility and ensure that the objectives are achieved in order to make an informed, risk-based, and accreditation decision. This module discusses about the certification process that supports the risk management process in the information system security program. This module covers the topics, such as, system certifiers and accreditors, certification and accreditation guidelines, certification and accreditation documentation, vulnerabilities and attacks, physical security requirements, and information technology security evaluation criteria. Page 5 of 8

6 Course Outline: Chapter 1: Introduction to Disaster Recovery and Business Continuity Introduction to Disaster Recovery and Business Continuity Disaster Disaster Recovery Best Practices for Disaster Recovery Business Continuity Disaster Recovery Versus Business Continuity Business Continuity and Disaster Recovery Planning Security Management Plan Chapter 2: Laws and Acts Introduction to Laws and Acts Types of Relevant Acts United States of America Laws and Acts Canadian Laws and Acts European Laws and Acts Australian Laws and Acts Chapter 3: Disaster Recovery Planning and Implementation Introduction to Disaster Recovery Planning and Implementation Aspects of Security Application Security Database Security Distributed System Security Firmware Security Industrial Security Vulnerabilities in Network Security Software and Services Remanence Disaster Recovery Plan (DRP) Business Impact Analysis (BIA) Disaster Recovery Roles and Responsibilities Disaster Recovery Planning Steps Disaster Preparedness Profiles Notification and Activation Procedures Disaster Recovery Planning in a Virtualized Environment Page 6 of 8

7 Chapter 4: Business Continuity Management Introduction to Business Continuity Management Elements of Business Continuity Management Business Continuity Plan Developing Business Continuity Strategies Crisis Communication Plan Emergency Response Plan Emergency Management Team (EMT) Contingency Planning Virtualization Disaster Recovery Chapter 5: Managing, Assessing, and Evaluating Risks Introduction to Managing, Assessing, and Evaluating Risks Importance of Risk Management Integration of Risk Management into the System Development Life Cycle (SDLC) Risk Management Methodology Threats Risk Assessment Methodology Attack Methods Countermeasures Weighing the Costs and Benefits of Risk Management Risk Assessment Responsibilities Responsibilities of Security Personnel Automated Testing Verification of Tools and Techniques Acquisitions Tools Chapter 6: Risk Control Policies and Countermeasures Introduction to Risk Control Policies and Countermeasures Countermeasures Risk Control Policy Development Factors Policy Development Page 7 of 8

8 Chapter 7: Data Storage Technologies Introduction to Data Storage Technologies Network Attached Storage (NAS) Direct Attached Storage (DAS) Storage Area Network (SAN) Chapter 8: Disaster Recovery Services and Tools Introduction to Disaster Recovery Services and Tools Why Back Up Data? Preventing Data Loss Developing an Effective Data Backup Strategy Backup Techniques Backup Schedules Removable Backup Media Potential Risks Challenges in Backup and Recovery Backup and Recovery Checklist Testing Data Recovery Data Backup and Recovery Tools Off-Site Data Backup Enterprise Backup Tools Chapter 9: Certification and Accreditation of Information Systems Introduction to Certification and Accreditation of Information Systems Certification and Accreditation Approval to Operate (ATO) Security Page 8 of 8

Course Title: Virtualization Security, 1st Edition

Course Title: Virtualization Security, 1st Edition Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised

More information

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Course Title: Penetration Testing: Network Threat Testing, 1st Edition Course Title: Penetration Testing: Network Threat Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base

More information

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title: Penetration Testing: Network & Perimeter Testing Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics

More information

Course Title Penetration Testing: Procedures & Methodologies

Course Title Penetration Testing: Procedures & Methodologies Course Title Penetration Testing: Procedures & Methodologies Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics

More information

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Course Title: Penetration Testing: Communication Media Testing, 1st Edition Course Title: Penetration Testing: Communication Media Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services

More information

Unit Guide to Business Continuity/Resumption Planning

Unit Guide to Business Continuity/Resumption Planning Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions

More information

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA 1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

SECTION 15 INFORMATION TECHNOLOGY

SECTION 15 INFORMATION TECHNOLOGY SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County

More information

Business Continuity Management

Business Continuity Management Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore

More information

Course Title: Computer Forensic Specialist: Data and Image Files

Course Title: Computer Forensic Specialist: Data and Image Files Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute

More information

Our Business Continuity Solutions Ensure Long-Term Success

Our Business Continuity Solutions Ensure Long-Term Success Hill Country Our Business Continuity Solutions Ensure Long-Term Success Hill Country Our Business Continuity Solutions Ensure Long-Term Success Why Business Continuity Planning Matters Whether you own

More information

NERC CIP Compliance with Security Professional Services

NERC CIP Compliance with Security Professional Services NERC CIP Compliance with Professional Services The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is

More information

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection

More information

BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION

BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION ENTER YOUR BUSINESS depends on electronic customer lists, confidential information and business records. Protecting

More information

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue

More information

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training State of South Carolina Policy Guidance and Training Policy Workshop All Agencies Business Continuity Management Policy June 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy

More information

Planning and Implementing Disaster Recovery for DICOM Medical Images

Planning and Implementing Disaster Recovery for DICOM Medical Images Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data

More information

PHASE 5: DESIGN PHASE

PHASE 5: DESIGN PHASE PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed

More information

AUDITING A BCP PLAN. Thomas Bronack Auditing a BCP Plan presentation Page: 1

AUDITING A BCP PLAN. Thomas Bronack Auditing a BCP Plan presentation Page: 1 AUDITING A BCP PLAN Thomas Bronack Auditing a BCP Plan presentation Page: 1 What are the Objectives of a Good BCP Plan Protect employees Restore critical business processes or functions to minimize the

More information

Temple university. Auditing a business continuity management BCM. November, 2015

Temple university. Auditing a business continuity management BCM. November, 2015 Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program

More information

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an

More information

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain 1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business

More information

A Best Practices Point of View from. Data Backup and Disaster Recovery Planning

A Best Practices Point of View from. Data Backup and Disaster Recovery Planning A Best Practices Point of View from Data Backup and Disaster Recovery Planning Security Protect Your Data Expertise Support Patient Privacy Business Continuity Plan and Restore Peace of Mind Backup and

More information

CIS 523/423 Disaster Recovery Business Continuity

CIS 523/423 Disaster Recovery Business Continuity CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will

More information

Why Should Companies Take a Closer Look at Business Continuity Planning?

Why Should Companies Take a Closer Look at Business Continuity Planning? whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters

More information

Disaster Recovery Planning Process

Disaster Recovery Planning Process Disaster Recovery Planning Process By Geoffrey H. Wold Part I of III This is the first of a three-part series that describes the planning process related to disaster recovery. Based on the various considerations

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

SNAP WEBHOST SECURITY POLICY

SNAP WEBHOST SECURITY POLICY SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one

More information

Electronic Records Storage Options and Overview

Electronic Records Storage Options and Overview Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for

More information

IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security

IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

Disaster Recovery and Business Continuity Plan

Disaster Recovery and Business Continuity Plan Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix

More information

NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems

NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems Marianne Swanson NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Table Of Contents Introduction to NIST SP 800-34

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Implementing and Managing Windows Server 2008 Clustering

Implementing and Managing Windows Server 2008 Clustering Implementing and Managing Windows Server 2008 Clustering Course Number: 6423A Course Length: 3 Days Course Overview This instructor-led course explores Windows Server 2008 clustering and provides students

More information

BUSINESS CONTINUITY PLAN OVERVIEW

BUSINESS CONTINUITY PLAN OVERVIEW BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

Cybersecurity Health Check At A Glance

Cybersecurity Health Check At A Glance This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not

More information

The Information Assurance Process: Charting a Path Towards Compliance

The Information Assurance Process: Charting a Path Towards Compliance The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.

More information

Continuity of operations for critical infrastructure. Disclosure of critical information to the government.

Continuity of operations for critical infrastructure. Disclosure of critical information to the government. Regulatory compliance is a significant factor influencing the development of your business resilience strategy. Moreover, while Business Continuity or Disaster Recovery regulations may not apply in every

More information

Contingency Plan for HIPAA

Contingency Plan for HIPAA TEMPLATE SUITE FOR BUSINESS CONTINUITY PLAN FOR SMALL BUSINESS (LESS THAN 50 EMPLOYEES) INCLUDES Total Cost: $549 Business Impact Analysis Enterprise Business Impact Analysis Survey Short (15 pages) Example

More information

DISASTER PLANNING AND RECOVERY

DISASTER PLANNING AND RECOVERY PLANNING IS THE KEY TO SUCCESSFUL DISASTER RECOVERY Source: US State Government Disaster Recovery Markets by Frost & Sullivan, A Global Growth Consulting Company DISASTER PLANNING AND RECOVERY In the aftermath

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security

More information

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management

More information

Contingency Planning Guide

Contingency Planning Guide Institutional and Sector Modernisation Facility ICT Standards Contingency Planning Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/CP Version: 1.20 Project Funded by the European Union 1 Document

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely Small Business Protection Guide Don t Leave Your Business at Risk Protect it Completely Changing risks, rising costs Information is fundamental to your business: You and your employees constantly exchange,

More information

BUSINESS CONTINUITY PLANNING

BUSINESS CONTINUITY PLANNING Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Resource Ordering and Status System. User Business Resumption Plan

Resource Ordering and Status System. User Business Resumption Plan Resource Ordering and Status System User Business Resumption Plan I. INTRODUCTION This document is the disaster preparedness and recovery plan for users of the Resource Ordering and Statusing System (ROSS).

More information

CERTIFIED DISASTER RECOVERY ENGINEER

CERTIFIED DISASTER RECOVERY ENGINEER CERTIFIED DISASTER RECOVERY ENGINEER KEY DATA COURSE OVERVIEW ACCREDITATION Course Title: C)DRE Duration: 4 days CPE Credits: 32 Class Format Options: Instructor-led classroom Live Online Training Computer

More information

Interactive-Network Disaster Recovery

Interactive-Network Disaster Recovery Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,

More information

Security Certification & Accreditation of Federal Information Systems A Tutorial

Security Certification & Accreditation of Federal Information Systems A Tutorial 29 Jun 2009 Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction to NIST s 800-37 Dr. Vijay Madisetti Professor, Georgia Tech - ECE vkm@gatech.edu Tutorial Outline

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late. BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Core Solutions of Microsoft Exchange Server 2013

Core Solutions of Microsoft Exchange Server 2013 EXCHANGE 2013 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Core Solutions of Microsoft Exchange Server 2013 Course Title Core Solutions of Microsoft Exchange Server 2013

More information

9/3/2009. Information Systems Disaster Recovery. Learning Objectives. Why have a plan? unexpected? APPA-Institute for Facilities Management

9/3/2009. Information Systems Disaster Recovery. Learning Objectives. Why have a plan? unexpected? APPA-Institute for Facilities Management Information Systems Disaster Recovery APPA-Institute for Facilities Management J. Craig Klimczak, D.V.M., M.S. Vice-Chancellor for Technology St. Louis Community College 300 South Broadway St. Louis, MO

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance

More information

Disaster Recovery for Ingres. Abstract

Disaster Recovery for Ingres. Abstract Disaster Recovery for Ingres A general disaster recovery discussion followed by Ingres specific issues and recommendations 2002-2003 Comprehensive Consulting Solutions, Inc., All rights reserved. Abstract

More information

Hong Kong Baptist University

Hong Kong Baptist University Hong Kong Baptist University Disaster Recovery Standard FOR INTERNAL USE ONLY Date of Issue: JULY 2012 Revision History Version Author Date Revision 1.0 Information Security Subcommittee (ISSC) July 2012

More information

MARQUIS DISASTER RECOVERY PLAN (DRP)

MARQUIS DISASTER RECOVERY PLAN (DRP) MARQUIS DISASTER RECOVERY PLAN (DRP) Disaster Recovery is an ongoing process to plan, develop, test and implement changes, processes and procedures supporting the recovery of the critical functions in

More information

Disaster Recovery Plan Review Checklist. A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans

Disaster Recovery Plan Review Checklist. A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans Disaster Recovery Plan Review Checklist A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans November 2008 DISASTER RECOVERY PLAN REVIEW CHECKLIST - FOR INTERNAL

More information

Planning for Disaster. Ramesh Ramani CISM CGEIT ramani@pcsuae.com 02 June 2010

Planning for Disaster. Ramesh Ramani CISM CGEIT ramani@pcsuae.com 02 June 2010 Planning for Disaster Ramesh Ramani CISM CGEIT ramani@pcsuae.com 02 June 2010 Agenda Disaster Management-Introduction Examples BCP and IT Continuity Process of Disaster Management-PDCA Disaster Management

More information

Certified Disaster Recovery Engineer

Certified Disaster Recovery Engineer Cyber Security Training & Consulting Certified Disaster COURSE OVERVIEW 4 Days 32 CPE Credits $2,500 When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should

More information

Department of Public Utilities Customer Information System (BANNER)

Department of Public Utilities Customer Information System (BANNER) REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology

More information

Business Continuity Planning. Donna Curran, Director Audit and Risk Management February, 2014

Business Continuity Planning. Donna Curran, Director Audit and Risk Management February, 2014 Business Continuity Planning Donna Curran, Director Audit and Risk Management February, 2014 Agenda Business Continuity Defined The Importance of a Plan Determining the Costs Business Impact Analysis MTO,

More information

Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010

Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010 Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010 1 Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010

More information

Flinders University IT Disaster Recovery Framework

Flinders University IT Disaster Recovery Framework Flinders University IT Disaster Recovery Framework Establishment: Flinders University, 1 August 2013 Last Amended: Manager, ITS Security Services, 4 October 2013 Nature of Amendment: Initial release Date

More information

Course Description. Course Outline. Duration: 5 days Course Price: $2,975. Software Assurance Eligible. About this Course

Course Description. Course Outline. Duration: 5 days Course Price: $2,975. Software Assurance Eligible. About this Course 10165 - Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1 Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) A Storage Area Network (SAN) is an independent network for storage subsystems, free from the rest of the computer network. In effect, a SAN removes the storage from the servers;

More information

Business Continuity Planning for Water Utilities: Guidance Document [Project #4319]

Business Continuity Planning for Water Utilities: Guidance Document [Project #4319] Business Continuity Planning for Water Utilities: Guidance Document [Project #4319] ORDER NUMBER: 4319 DATE AVAILABLE: June 2013 PRINCIPAL INVESTIGATORS: Jack Moyer, Rhiannon Kincaid, Kory Wilmot, Kate

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for As the importance and value of corporate data grows, complex enterprise IT environments need

More information

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services STAY PROTECTED WITH OUR BACKUP AND

More information

Ohio Conference for Payroll Professionals Disaster Recovery

Ohio Conference for Payroll Professionals Disaster Recovery Ohio Conference for Payroll Professionals Disaster Recovery Speaker Bruce E. Phipps CPP 2011 APA Payroll Man of the Year Principal Product Manager US Legislative Analyst ORACLE Corporation bruce.phipps@oracle.com

More information

MHA Consulting. Business Continuity Management 101

MHA Consulting. Business Continuity Management 101 0 MHA Consulting Business Continuity Management 101 Presented by: Michael Herrera Brandon Magestro MHA Consulting Agenda MHA Consulting Introduction Business Continuity Management (BCM) Defined 2013 Trends

More information

DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008

DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008 DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark

More information

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000. U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098

More information

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. 1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

About RecoveryPlanner.com Business Continuity Management

About RecoveryPlanner.com Business Continuity Management RecoveryPlanner Web-Based Planning Software About RecoveryPlanner.com Business Continuity Management Founded by experts in disaster recovery, business continuity and emergency response in 1999, RecoveryPlanner

More information

MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V

MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials Outline Introduction

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Planning for Disaster Disaster

Planning for Disaster Disaster Planning for Disaster Ramesh Ramani CISM CGEIT Ramesh Ramani CISM CGEIT Paramount-Dubai Agenda Disaster Management-Introduction Examples BCP and IT Continuity Process of Disaster Management-PDCA Disaster

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist

More information

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business Business Continuity & Disaster Survival Strategies for the Small and Mid Size Business AGENDA Welcome / Introduction

More information

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. Business Continuity Management & Disaster Recovery Planning Presented by: Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. 1 What is Business Continuity Management? Is a holistic management

More information