Chapter 5

Disaster Recovery

Scott R. Ellis and Lauren Collins,    kCura Corporation

Since the environment is ever changing in an organization, the disaster recovery (DR) environment must also be continuously replicated and tested at a pace determined by the team who works on the DR plan. It must be periodically audited. Roles must be revised and reassigned as needed. The science of a DR plan, the exact nuts and bolts of the many technologies used and approaches to take, is beyond the scope of this chapter. For example, just the DR options for SQL server applications represent a very large body of work. Failover technologies, software for IP and phone rerouting, and other data synchronization technologies do exist. The information presented in this chapter will provide insight into the job of DR and provide a framework of what is necessary to achieve a successful Disaster Recovery plan.

Keywords

disaster recovery; information technology; risk; enterprise risk management; risk assessment; threat; business impact assessment; business-critical activities; high density infrastructure; recovery solutions

1 Introduction

In almost every organization, when a technology-oriented task is at hand, and where no one knows who would handle the request, it typically lands in the information technology department (IT). Whether the task consists of a special, faulty light bulb or a backup for a grease stop in the kitchen sink, organizations rely heavily on the IT department to know the unknown, and to fix anything that breaks.

Disaster recovery (DR), not unlike the plugged sink, is another task that many organizations fail to consider until after much of the technology groundwork has been laid, the corporation is profitable, and suddenly someone realizes that not having a DR site is a serious risk to the business. It is at this time that they begin to consider, and they begin to ponder, what a strategy might look like that enables the business to continue to run in the event of Force Majeure or some other disaster, such as if a hacker came in and tore their system down, or somehow seized control of it.

Hardware, physical or virtual, must be acquired and configured to capture the environment as it currently sits–and it must be able to continue with its synchronization. Whether this is by the minute, the hour, the day, or the week is a business decision. In fact, much of the DR strategy is driven by business continuity requirements. In the event of a disaster, there must be a plan in place that considers which individuals will act in the event of a disaster. Those individuals must know what constitutes a disaster, and the roles must be defined for those individuals.

2 Measuring Risk and Avoiding Disaster

A key component of a disaster recovery (DR) plan is for the committee to assess conceivable risks to the organization that could result in the disasters or emergency situations themselves. All events must be considered, and the impact must also be reflected upon so that the organization has the ability to continue and deliver business as usual. Quantitative and qualitative risks are considered separately in a DR plan; however, both come together when determining how an organizations reputation and earnings should be managed in the event of a disaster. Risk is assessed on an inherent and residual basis, allowing an entity to understand the extent to which potential events might impact objectives from two perspectives, likelihood and impact.

Assessing Risk in the Enterprise

Enterprise Risk Management (ERM) is not a template that can be given to every company to meet their needs and fit their business structure. Proper risk assessment identifies the risks throughout the organization and specifies the external and internal sources that the organization may face. The organization engages members from each organizational unit (Executives, HR, Finance, etc.), and asks questions such as “What do you perceive to be the largest risks to the company in terms of significance and likelihood?” and “What do you perceive to be the biggest risks within your control?” After a common understanding is met and all are aware of the risks, such risk assessments should be linked to strategic objectives as shown in Figure 5.1.

image

Figure 5.1 Risk assessments are linked to strategic objectives in an organization as a whole to allow a company to understand the risks in the organization, the company’s risk appetite, and risk tolerance.

Once the company has an understanding of the top risks that can impact the organization, the executive team determines the company’s risk appetite and risk tolerance. Risk appetite is the amount of risk, on a comprehensive level, that an entity is willing to accept in pursuit of value. Risk tolerance, on the other hand, is the range of acceptable variation around the company’s objectives. The key is to determine the degree of maturity that meets the needs of your organization.

Steps in the Risk Process

There are five steps to consider for a company to come out ahead when a disaster hits to avoid risk and protect your data. The following checklist (see checklist: An Agenda for Action for Risk Assessment) is a list of these steps, from assessment to planning, architecting, specifying and implementing a full-bodied disaster recovery (DR) solution.

An Agenda for Action for Risk Assessment

Steps in Risk Assessment (check all tasks completed):

_____1. Discover the potential threats:

_____a. Environmental (tornado, hurricane, flood, earthquake, fire, landslide, epidemic).

_____b. Organized or deliberate disruption (terrorism, war, arson).

_____c. Loss of utilities or services (electrical power failure, petroleum shortage, communications services breakdown).

_____d. Equipment or system failure (internal power failure, air conditioning failure, production line failure, equipment failure).

_____e. Security threat (leak of sensitive information, loss of records or data, cyber-crime).

_____f. Supplementary emergency situations (workplace violence, public transportation disruption, health and safety hazard).

_____2. Determine requirements:

_____a. Prioritize processes

_____b. Determine recovery objectives

_____c. Plan for common incidents

_____d. Communicate the plan

_____e. Choose individuals who will test plan regularly and act in the event of a disaster

_____3. Understand DR options:

_____a. Determine how far to get the data out of the data center.

_____b. Will the data center be accessible at the same time as the disaster.

_____c. Determine the process to backup and/or replicate data off-site.

_____d. Determine the process to recreate an environment off-site.

_____4. Audit providers:

_____a. Compare list of providers with internal list of requirements.

_____b. Understand range of data protection solutions offered

_____c. Assess proximity (power grid/communications and contingencies).

_____d. Data center hardening features and their DR contingencies.

_____5. Record findings, implement/test, and revise if/as necessary:

_____a. Documentation is the heart of your plan.

_____b. Test and adjust plan as necessary, record findings.

_____c. As the environment changes and business needs change, revise the plan and test again.

Downtime presents serious consequences for businesses, no matter what their function may be. It is difficult, if not impossible, to recoup lost revenue and rebuild a corporate reputation that is damaged by an outage. While professionals cannot expect to avoid every downtime event, the majority of system downtime is caused by preventable failures. Distinguishing between planned and unplanned system downtime allocates different procedures as both present vastly diverse paths when bringing systems back up.

While both planned and unplanned downtime can be stressful, planned downtime must be finished on time. Unplanned is the worst. Unplanned can be good for teaching troubleshooting techniques to junior IT staff, but can be very frustrating to the workforce. The authors see fewer and fewer techs with troubleshooting experience, and more and more senior techs launching their own consultancies. The biggest cost is how it affects the customers and the impressions of the company that a severe outage can make on the organization’s customers and clients. Planning, having people on staff with good troubleshooting skills, and documenting how the issue was found and fixed will help resolve the issue faster next time.

Matching the Response to the Threat

Separate each of your significant processes into one of three categories: Mission Critical, Business Critical or Organizationally Critical. By classifying processes into categories, you are able to define which parts of the organization would be recovered first in the event of an outage or disaster. How long can your organization or group live without access to a particular system? Should this system fail, how much data can the business realistically handle losing? Define, succinctly, what the organization considers a disastrously disruptive event and set the maximum amount of time you can go without access to your system. Then set the acceptable amount of data loss from the most recent backup, or replication. Repeat this step for each system and you will soon realize which systems have the highest priorities and highest impact. Look back in history and identify types of outages the firm has experienced and how those outages were dealt with. If one is more relevant than another, plan for that incident first.

3 The Business Impact Assessment (BIA)

A business impact assessment is a solution that determines critical business processes based on their impact during a disruption. An organization must define resilience requirements, justify business continuity investments, and identify a robust risk mitigation strategy. Unplanned disruptions can be costly, resulting in major losses, customer dissatisfaction, and compliance issues. To counter such risks, developing an effective, end-to-end business resilience plan is a necessary component to business continuity and recovery solutions.

Identifying Business-Critical Activities

An organization must have a thorough understanding of the critical business processes and the tolerance of a business outage to define objectives to succeed in the event of an outage. A successful solution employs a vertical and horizontal, or top/down approach to understand, identify, and map critical business processes, functions, IT systems, resource dependencies, and delivery channels. The organization must analyze the cost of disruptions and place them into resilience tiers to assist in defining operational availability and disaster recovery requirements from a business perspective.

Additionally, Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) are perhaps the most important key metrics when architecting a disaster recovery solution. An RTO is the amount of time it takes to recover from a disaster event, and an RPO is the amount of data, measured in time, that your organization lost from that same event. The two business-driven metrics will set the stage for:

• Media chosen to recover (disk, tape, etc.)

• Location where data is being recovered

• Size of the recovery infrastructure and staff needed

Keep in mind that there are several intricacies to consider when assessing RTOs and RPOs. First, the objective in both stands for “objective” and should be defined as the target. If an RPO is five hours, then the architecture must ensure data loss of five hours or less. Therefore, when testing or recovering from a disaster, document and track actual thresholds achieved, including recovery point and recovery time. In many test cases, the time to recover does not meet the objective due to overhead time. Examples of overhead time are as follows:

• Selection of staff and determination in DR teams

• Declaration of the disaster and logistics to the recovery site

• Consideration of massive chaos is involved in initiating a recovery from a disaster event

When tracking and documenting actual versus objective, especially during testing, you will understand what is being accomplished in a given period of time. Figure 5.2 illustrates a flowchart of conflict resolution in the BIA and shows how time can be calculated when following the flow of the dependencies. Ultimately, this will allow a firm to defend future investment by honing your recovery methodologies and processes to better meet or exceed those objectives. Once the recovered data is made available and back to the application, the end users and owners of the applications only understand the RPO and RTO specific to usability of the application with an understood and acceptable amount of data loss in a specified amount of time.

image

Figure 5.2 Flowchart illustrating the formula used to calculate the time a department receives items and performs actions prior to passing onto another department.

Specifying Required IT Support from Technical Staff

There are challenges associated with managing a high-density infrastructure coupled with the technology each department integrates into that infrastructure. To meet the continually increasing demand for faster, better, and more powerful technology, IT directors are deploying high-density equipment with great processing powers encompassing a small footprint in the data center.

Incongruent IT teams include storage, server, network, and application teams; all understand their specific roles in recovering from a disaster, which is why tests are so crucial. However, once the infrastructure is recovered with the associated application data, many more tasks are required to make the application usable and available to the end users. Consider, for example, what the DBAs need to do to the databases and what the application and software teams need to do in order to validate functionality. Thus, having these objects defined and metrics in place will help with the testing and checkpoints in the recovery process to ensure that the RTOs and RPOs are met successfully.

Designing Recovery Solutions

Many kinds of “disasters” can occur in business. Typically, one thinks mostly of natural disasters when one thinks of disasters. To do this when planning a disaster recovery solution is a fatal mistake. For example, consider a small company (or possibly even a large company!) where one or a small number of people control access to all data. Perhaps only one person has access to critical systems that, one day, may require reconfiguration or repair. What if that day comes sooner than expected, and what if that person was involved in a fatal car accident on the way to work? This sort of scenario and myriad others plague the information technology industry. The amount of risk tied up in IT director fiefdoms could, if exercised by a wide-scale disaster one day, bring about a nationwide business calamity. Think about the assorted systems that could be affected by the following “disasters:”

• Loss of bidirectional communication

• Loss of Internet connectivity

• Data loss

• Life lost

The final point, while not directly related to information technology and the preservation of business continuity through tragic, business-altering events is included because, at the heart of all the systems exist the human beings who operate and understand them. Recovery solutions should consider the human element. More importantly, a disaster recovery should be able to do just what the name implies—it should allow complete recovery, if not business continuity, through any disaster.

Consider, for example, a software company called Knowledge Inc. that provides critical software services to many of the Fortune 500 companies. On a Friday afternoon, a terrorist attack destroys their one, and only, location. The 400+people who ran the company, except for those who were out sick or were on the road, are no more. Granted, the owner of the company has nothing to worry about anymore; he was in his office, but those 300 Fortune 500 companies, what about them? From their perspective, they are likely asking themselves why they never asked to see the DR plan for Knowledge Inc. They should have asked about the business recovery plan. Ostensibly, then, a DR plan contains two parts:

• Technology and data redundancy

• Business recovery

No business should ever close down due to a disaster. Yes, closing a business’s books and winding down after a disaster could be the outcome of a disaster, but that should be a business decision, not a forced event. That is, the disaster itself, followed by a poorly executed or nonexistent DR plan, should not be a business-ending event. Closing the business or selling its assets may be the decision made by survivors and beneficiaries, but by preserving the business through proper DR planning, this should be just one of many options, not the only option after a disaster. As intimated earlier, disasters come in many forms, which can be loosely grouped into three categories:

1. Force Majeure

2. Conditional

3. Human

Force Majeure, or catastrophe, is obvious. Events such as hurricanes, earthquakes, fire, flood, war, volcanic eruptions, and terrorist acts all fall into this category.

Conditional is less obvious and revolves around the circumstances of an unexpected change in infrastructure conditions. For example, on a Monday afternoon, the Internet “goes down.” Service doesn’t’ resume until Wednesday evening because it took that long for the service provider to find the problem. In another example, a construction crew saws through all three trunks that service the city of Chicago. As a result, 99% of the city loses its Internet. The other 1%? They had a recovery plan that included routing phones and Internet through a satellite dish on their roof.

The human category means loss of life and the business impact. For example, what if a strange new virus decimated more than half the organization’s staff, and for some strange reason, it wiped out all but the most itinerant staff members, who have little knowledge of operations. A solid DR plan will consider that a disaster can occur, and all infrastructure may remain intact.

Establishing a Disaster Recovery Site

Once a disaster recovery plan has been created that includes both fail and no-fail infrastructure circumstances, a plan must be made that allows for varying degrees of infrastructure failure. For example, consider the conditions that must exist before someone says “Break out the black book!” and the organization shifts its mind-set into one of disaster recovery. For example, consider the following course of events:

1. The Internet goes down.

2. IT fails to back up Internet connections (there are three alternative paths to the Internet). Each path fails.

3. A DR link to the data center is powered up and established. This link is a point-to-point optical wireless linkup to the data center. There is no Internet at the data center either.

4. The DR link to the failover data center is powered up and established. This data center is also down.

5. Nobody knows what is happening yet, but one thing is certain: While the plan was okay, because there was even an alternative, nonphysical link to two data centers, one that was a failover site, it didn’t help because the DR data center site was only a couple of miles from the primary.

In the event of a disaster, DR sites should be as logically separated from a catastrophe point of view as possible. To establish what makes a good DR site, let’s explore disaster a little bit.

Site Choices: Configuration and Acquisition

Since this is a book about computer and information security, and not about business alternative planning, these next sections will focus primarily on force majeure and conditional disasters. The assumption it makes is that the business critical functions have been deemed complex and necessary enough that a geographically disparate location is desirable and necessary. For many, disaster recovery is about backup planning. A distinction between the two must be made. Backup and recovery addresses one thing, and only one thing: For example, a hacker accesses the system and deletes a small but critical table from a database. This is a backup and recovery option. You simply restore from backup, and you are up and running again. Disaster recovery is more severe, and it implies that the recovery of data after an incident that destroys equipment or data in tandem with an event of some sort has rendered equipment and communications at a particular site unusable. In this case the definition of unusable is one of a business nature:

• DR definition of unusable: Equipment or data or communications that are not functioning for such a length of time as to render irreparable damage to business revenues or relationships.

• Unusable, then, in the business sense, must be taken in the context of this sentence.

• Disaster recovery is a sequence of events that, regardless of extenuating circumstances, will restore the full functionality of data, communications, or equipment, located at some one site or many sites, that has been rendered unusable by some event.

Over time, some piece of equipment may become unserviceable, but in terms of disaster recovery, something is unusable only if its unserviceability inflicts damage on the business. Disaster recovery assumes one thing is true: that a major, business critical function has ceased operation due to one of the aforementioned reasons, and that it can no longer continue.

The following list details a number of disasters and chooses alternative locations. In the end, one may consider that the disaster is too unlikely to occur, and that if the disaster were to occur (such as an asteroid strike), there would likely be no point in continuing business anyway—simply surviving will be everyone’s concern, and whether or not customers can purchase concert tickets will be moot if nobody is going to be going to concerts any time soon. Table 5.1 provides a sample listing of DR failover locations, the disaster that occurs, and the reason why it is a bad choice. This table seeks to provide a thought experiment framework whereby a planner may base a similar table for her location.

Table 5.1

The Portland Example Serves to Illustrate that While a Disaster Recovery Planned Site may Appear to be Perfectly Acceptable, even if Affected by Collateral After-Affects, the type of Infrastructure and the Routing of the Trunks, all May Play a Part. The ENTIRE Infrastructure of the Environment, and all the Unknown Interdependencies should be thoroughly Uncovered, Explored, and Understood.

Image

Choosing Suppliers: In-House Versus Third Party

As evidenced by Table 5.1, the complexity of choosing a DR location that is a perfect ying to your primary locations yang is not an easy task. If one assumes that the third-party provider has been in business for a while, has experience in the field, and is not just an investor who purchased an underground quarry in Kansas City and simply didn’t know what to do with it, then the primary reason to contract a DR provider will be one of reliability.

Furthermore, the DR provider will host other companies, which means that they will likely be performing the sort of monthly and manual testing of their failover electrical and uplink capabilities that is required. This results in a savings due to the economy of scale. A company that has to test its systems understands that testing takes time, is expensive, and may result in unanticipated damage to equipment should a faulty failover mechanism result in a massive surge through the power grid.

Typically, businesses that aren’t savvy or interested in the facts of disasters— that they do happen, and they can happen to them—may make a rather cursory attempt at DR. They may blend some non-DR site functions with the DR site. The mistake they make in doing this relates directly to redundancy—inherent to the DR strategy is that, essentially, both sites require each other to act as backup. If the DR site is being used, and it fails, it would need to failover to the primary site. Organizations that are greatly concerned about business continuity will segregate business functions completely. When contracting a vendor to handle DR, the business will drive the requirements. Things like email, database applications, HR, and finance systems may not have the same impact of loss as, for example, a Web site that takes customer orders.

When building a DR plan, the planners must consider the scope of the disaster as well, how the vendor charges, and whether or not multiple vendors are required to fully comply with business needs. For example, for some companies, it is perfectly acceptable that employees could work for home in case the DR triggering event also closed the physical office. Other companies may have differing compliance issues and may require a secure facility. They may even require that employees travel to a distant location and work there. Now, arrangements have to be made for both PC access to network systems and food and lodging. This author recommends a nice resort that has conference center capabilities that could be set up to provide workstations. Do bear in mind that some employees will require family housing. Choosing to provision DR through in-house versus choosing an external vendor requires comparing and determining a number of factors:

• Skills—Decide whether or not the IT team has the skills and the time (or can hire someone.)

• Location—Determine whether or not the location is suitable. For example, a large law firm may already have multiple data centers. It begins to make sense to handle disaster recovery internally if the company is not segmented in such a way that use of its multiple data centers will cause internal turmoil (this speaks to the IT fiefdoms alluded to earlier.)

• Estimated downtime—The definition of a disaster has already been described as involving the length of the downtime. How much further past the qualifying outage window is tolerable? If the best that internal resources can do is 24 hours to get a remote DR site functional and the requirement is 2 hours, outside help should be sought.

Figure 5.3 diagrams a failover site. Data flows are unidirectional to the DR site. It is a common fallacy that the DR site can also provide some functionality to the enterprise and serve as more than just a graveyard for servers, waiting for the day they must spring to life and perform a critical duty.

image

Figure 5.3 In a DR site, one can expect to see a slimming down of the amount of equipment needed. Configuring applications to work in such an environment will be a balance between labor costs and estimates of configuration time and the cost of additional servers. Rewriting application code to force a distributed application to work with a reduced server requirement may not be cost effective.

Specifying Equipment

The challenge of a DR site is primarily cost, followed closely by configuration. Setting it up, planning redundancy, creating strategies for rerouting voice, messaging, email, delivery of goods, and so on are things that can be written and kept within arm’s reach of all employees. ALL employees should be aware of the DR plan. No single employee should be left wondering what his role is during a disaster.

Configuration and cost are closely related. In just one example (of many similar), consider a complex federated database where many applications and many databases commingle information and exist in harmony on a home-grown system across 30 or 40 SQL servers. Picking up something so complex, and moving it, is not a simple task. It may take many weeks of reconfiguration to get such as system to be functional at the DR site. The complexity of an application and the ease of setting it up in a DR site should always be considered during the purchasing and application review phase. Waiting until afterwards to think about the DR site can be a very costly mistake. A DR-ready application will be able to collapse down to just a couple of servers and will be able to provide core functionality, with additional functionality brought online with the addition of more servers as needed.

A DR site is a site that is to be used for a temporary period of time. Typically, the hope is that the DR failover will not be permanent. However, this should be a planned contingency—that it will be permanent and that you may need to rapidly scale the environment. This is not to say that a DR site should be a fully functional, duplicate site of the primary site that failed. Rather, it should be able to support essential business functions. Suppose, for example, an enterprise that hosts a document review platform. Many people would like to access the system, but in the contract with its clients, the business is only committed to support minimal, required activities, and they are listed. Contractually, activity should be restricted. Only known, business-critical activity should be conducted. Users should only be performing activities that are business critical for them or their customers.

From an equipment purchasing standpoint, then, only minimal hardware need be purchased. Some companies may even refer to their DR site as “the graveyard” and the DR plan as a “Dawn of the Dead” plan. However, from a strategic standpoint, rack space MUST be available for rapid growth. Should the disaster become lengthy, or should the outage be permanent, the enterprise must be able to scale rapidly. Many business computing sales companies will configure a “standing order.” This is something that, for a price, can be held in a sort of “escrow” until needed. When an outage becomes extensive, or permanent, or is recognized as being permanent the moment it happened, then pulling the trigger on such an order could actually be automatic and scripted in the failover plan. After all, in the event of a Dawn of the Dead, the graveyard will need to be fed more brains.

4 Summary

Creating an effective, risk-biased, deployable DR plan that carefully considers human and technology interests takes time and attention. The solution to just about all DR issues that crop up will be to spend more money. This is where the art of it, and the experience of the designers, will either make or break the plan. Inexperienced planners may make assumptions and will overlook critical aspects of how to deploy the plan. They may not take it seriously, but as has been seen in recent history, expect the worst. Maintaining a heightened state of awareness is the rule of the day. Experienced IT professionals will be able to design a plan that is effective.

These authors recommend that a disaster recovery team be made up of the most senior people in the company—people who have been with the company for a long time and know its every system inside and out. These are people who should have ten or more years of experience in IT, if not with the company itself. These are the people who can ensure that, should a disaster occur, business will continue—because they are the ones doing this work already— they are the ones who are called when something is broken and nobody else can get it right. They are the ones who can unclog a plugged firewall, who have the part number for that odd LED in the service rack memorized, and they are the ones who could, if needed, rebuild the entire infrastructure from scratch, preferably while they sleep. Essentially, that is what DR is. It is an essential-function rebuilding of the entire company. Asking it to be anything less is simply asking for failure.

Finally, let’s move on to the real interactive part of this chapter: review questions/exercises, hands-on projects, case projects, and optional team case project. The answers and/or solutions by chapter can be found in the Online Instructor’s Solutions Manual.

Chapter Review Questions/Exercises

True/False

1. True or False? Disaster recovery (DR), not unlike the plugged sink, is another task that many organizations fail to consider until after much of the technology groundwork has been laid, the corporation is profitable, and suddenly someone realizes that not having a DR site is a serious risk to the business.

2. True or False? A general component of a disaster recovery (DR) plan is for the committee to assess conceivable risks to the organization that could result in the disasters or emergency situations themselves.

3. True or False? Enterprise Risk Management (ERM) is not a template that can be given to every company to meet their needs and fit their business structure.

4. True or False? Downtime presents moderate consequences for businesses, no matter what their function may be.

5. True or False? A business impact assessment is a solution that determines critical business processes based on their impact during a disruption.

Multiple Choice

1. An organization must have a thorough understanding of the ______ and the tolerance of a business outage to define objectives to succeed in the event of an outage.

A. qualitative analysis

B. vulnerabilities

C. critical business processes

D. malformed request DoS

E. data controller

2. There are challenges associated with managing a ________, coupled with the technology each department integrates into that infrastructure.

A. network attached storage (NAS)

B. risk assessment

C. valid

D. high-density infrastructure

E. bait

3. There are many types of _________ that can occur in business.

A. data minimization

B. fabric

C. disasters

D. risk communication

E. security

4. Once a disaster recovery plan has been created that includes both fail and no-fail infrastructure circumstances, a plan must be made that allows for varying degrees of:

A. risk management

B. greedy strategy

C. infrastructure failure

D. SAN protocol

E. taps

5. What are equipment or data or communications that are not functioning for such a length of time as to render irreparable damage to business revenues or relationships?

A. Irrelevant

B. Tape library

C. IP storage access

D. Configuration file

E. Unusable

Exercise

Problem

What are the differences among a Continuity of Operations Plan (COOP), a Business Continuity Plan (BCP), a Critical Infrastructure Protection (CIP) Plan, a Disaster Recovery Plan (DRP), an Information System Contingency Plan (ISCP), a Cyber Incident Response Plan, and an Occupant Emergency Plan (OEP)?

Hands-On Projects

Project

What type of alternate site should an organization choose as a disaster recovery strategy?

Case Projects

Problem

When an event occurs, who should be notified?

Optional Team Case Project

Problem

With what other activities should the ISCP and the recovery solutions be coordinated?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.134.133