
Disaster Recovery.
Title:
Disaster Recovery.
Author:
Varghese, Mathew.
Personal Author:
Physical Description:
1 online resource (320 pages)
Contents:
Contents -- Introduction -- Chapter 1 Disaster Recovery Planning: An Overview -- Need for Disaster Recovery Planning -- Benefits of Disaster Recovery Planning -- Disaster Recovery Planning Strategies -- Planning Considerations -- Phases of Disaster Recovery Planning -- Initiation -- Risk Analysis -- Creation and Implementation of the Plan -- Testing of the Plan -- Maintenance of the Plan -- Organizational Planning Structure -- Planning Team -- Recovery Team -- Recovery Objectives -- RPO -- RTO -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 2 What Constitutes a Disaster? -- What Is a Disaster? -- Causes of Disasters -- Natural Disasters -- Manmade Disasters -- Disasters and Their Consequences -- Summary -- Check Your Understanding -- Short Questions -- Answers -- Short Answers -- Chapter 3 Categorizing Disasters -- Disasters: Impact and Severity Level -- Categorizing Disasters: Severity of Impact -- Hard Disk Subsystem Failure -- Server Failure -- Power Crisis -- Accidental Deletion/Modification of Critical Data -- Theft or Sabotage -- Virus Attack -- Network Failure -- Systems Software Failure -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 4 Risk Analysis -- Defining a Risk -- Voluntary and Involuntary Risks -- Inherent and Acquired Risks -- Insurable and Uninsurable Risks -- Defining the Process of Risk Analysis -- Benefits of Risk Analysis -- Performing Risk Analysis -- Guidelines for Performing Risk Analysis -- Risk Analysis Methodologies -- Phases of Risk Analysis -- Output of Risk Analysis -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers.
Chapter 5 Baseline Measures -- Access Control -- Authentication -- Permissions -- Encryption -- Anti-Virus -- Types of Viruses -- Anti-Virus Software -- Firewalls -- Functions of Firewalls -- Types of Firewalls -- Firewall Considerations -- IDSs -- IDS Models -- Selecting an IDS -- Analyzing IDSs -- Data Backup -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 6 The Recovery Plan -- Objectives of a Disaster Recovery Plan -- Steps to Create a Disaster Recovery Plan -- Identifying Recovery Strategies -- Selecting Recovery Strategies -- Creating the First Draft -- Components of a Disaster Recovery Plan -- Creating the Final Draft -- Steps to Implement the Plan -- Conducting Training -- Conducting Drills and Exercises -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 7 Testing and Maintaining the Recovery Plan -- Need for Plan Testing and Maintenance -- Plan Testing -- Objectives of Plan Testing -- Preliminaries to Plan Testing -- Types of Tests -- Key Steps in Plan Testing -- Plan Testing Documents -- Plan Maintenance -- Change Management -- Means of Change Management -- Scheduled and Unscheduled Maintenance -- Maintenance Cycle Checkpoints -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 8 Recovery Plan for Centralized Systems -- Planning for Data Recovery -- Analyzing and Classifying Information -- Reviewing Existing Backup Strategies -- Selecting and Evaluating a Backup Strategy -- Implementing the Backup Strategy -- Planning for System Recovery -- Identifying Critical Applications and Hardware -- Next Box Off the Line Strategy.
Reciprocal Backup Strategy -- Cold Sites -- Hot Sites -- Service Bureaus -- Redundant Systems Strategy -- Planning for Building Recovery -- Planning for Communication Link Recovery -- Recovery of Computer Peripherals and Terminal Network -- Restoring WAN and Data Network Links -- Planning for Personnel Recovery -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 9 Recovery Plan for Decentralized Systems -- Planning for Data Recovery -- Sorting Data -- Policy-Based Administration of Data -- Planning for System Recovery -- Employ Replication -- Choose Middleware Judiciously -- Encourage a Clearly Defined Partitioned Design for Applications -- Encourage Fault-Tolerant Configurations -- Encourage Web-Enabled Applications -- Planning for Building Recovery -- Next Box Off the Line Strategy -- Hot Sites and Redundant Systems -- Service Bureaus -- Application Consolidation -- Centralization -- Planning for Communication Link Recovery -- LAN Recovery -- Internal Voice Communication -- Planning for Personnel Recovery -- "On-the-Fly" Approach -- The Alternative Approach -- Commercial Recovery Facilities -- Remote Access -- Summary -- Check Your Understanding -- Short Questions -- Answers -- Short Answers -- Chapter 10 Implementing a Disaster Recovery Plan -- Case Study -- Disaster Recovery Plan Activation -- Factors That Lead to a Successful Recovery -- Predisaster Stage -- Planning Stage -- Post Disaster Stage -- Summary -- Appendix A: Best Practices -- Appendix B: FAQs -- Appendix C: In the Wings -- Appendix D: Common Modes of Attack and Intrusion Detection Systems -- Common Modes of Attack -- IP Spoofing -- Sniffing -- DoS Attacks -- Intrusion Detection Products -- Selecting an Effective Intrusion Detection Product -- Intrusion Detection Products.
Appendix E: Evaluating Available Firewall Products -- Router (Stateless Packet-Filter Based) Firewalls -- Cisco 2500 Series -- Livingston FireWall IRX -- The Security Router -- Stateful Packet Filter-Based Firewalls -- BorderManager -- Firewall-1 -- PIX Firewall -- GNAT Box Firewall -- NetScreen Firewall -- Guardian Firewall -- Application Proxy Firewalls -- Firewall Server -- Raptor Firewall -- Sidewinder -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Z.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Genre:
Electronic Access:
Click to View