Free Essay

Is3110 Week 5 Lab

In:

Submitted By brettwlvn
Words 467
Pages 2
Lab Assessment Questions

1. How do documented back-up and recovery procedures help achieve RTO? * By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. 2. True or False. To achieve an RTO of 0, you need 100% redundancy in your IT system, application, and data. * True. This is a special case of disaster recovery called business continuance. Technology that is capable of maintaining a synchronous mirror or continuous data replication stream must be utilized for all data (work product, application, server personalities, etc.).

3. Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data back-up? * The goal of backing up data is to be able to restore it. 4. Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data recovery? * Perform test restores. A test restore will attempt to restore data from a recent backup. If the test succeeds, the backup is good. If the test doesn’t succeed, the backup process needs to be addressed. 5. What are the risks of using your external e-mail box as a back-up and data storage solution? * It takes too much time. It can take days to upload a baseline copy of your data, and in the event of a disaster it will take days to download and restore your data. * It's just not practical * Automatic settings for online backup can skip important folders and include useless ones. It is no replacement for the human mind in making important decisions. No piece of software can possibly know what is appropriate for your specific situation without your help; it can't know which user(s) to back up, which email program you use, or where your bookkeeping files are stored. * There are good reasons to use external drives to organize your data, but many services will only back up data on your internal hard drive, ignoring any external drives. * Online backup or storage accounts can be just as easily be "hacked" into as your email accounts can be. * Online services don’t automatically encrypt your data on their storage which means that employees or law enforcement have access to you data and you may not even be notified. * Security breach of an online service can put your data at risk. * Company stability can cause any service to change their Terms of Service. * Your legal responsibilities as a business owner with your client’s personal information. * Your data can't be backed up or restored if your internet connection is down.

Similar Documents

Premium Essay

Informative

...Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools...

Words: 18421 - Pages: 74