Determine the risk to network data and provide

advertisement
Determine the risk to network data
and provide data recovery services
according to organisational
procedures
1
2004
Preview
Network Administrators need to determine the security requirements of an
organisation, identify the risks to security, and make use of a disaster
recovery plan (DRP) in the event of a minor or major disaster situation.
Before an organisation can develop a DRP it needs to undertake a risk
analysis to gauge the impact of loss and threats to the network. Contributing
to the risk analysis is part of the role of a Network Administrators. You will
not be expected to undertake a full risk analysis, but rather contribute to it,
especially by providing technical issues and recovery options.
Learning outcomes
After completing this topic you will be able to:

Review security requirements for users and data to be stored on the
network.

Determine any risks to which data is exposed and provide
appropriate prevention and recovery processes.

Document the disaster recovery process.

Implement systems to provide backup and be able to restore services
in the event of a disaster.
Before you start
You should be familiar with the features of a network operating system,
using network administration tools, and backup procedures.
Check your understanding
Do you think you already have the knowledge covered in this topic? Answer
the following questions to check your understanding.
Answer true or false.
2
2004
The place to start a review of risk and recovery procedures is to look at the
security in place to stop access to the office building.
Feedback
Correct, this is false. The place to start is with the organisation’s policies
and any Service Level Agreement (SLA) requirements.
Try again.
Standards for how quick the organisation should be able to recover from a disaster will be
found in:
The backup documentation
The SLA
The latest audit report
The Standards Australia handbook
Feedback
Correct. This information is found in the SLA.
Try again.
What types of systems are ‘mission critical’?
Feedback
Financial, customer-related, cash flow-related, etc, are all systems that can
be critical to the core business of an organisation or business.
What are the steps to follow when carrying out a risk analysis on the network?
Feedback
To carry out a risk analysis on the network:
Identify threats to the network operations/services.
Consider the probability of each of the threats occurring.
Estimate the cost of resulting losses.
Consider the safeguards that could be put into place.
Undertake a cost benefit analysis of implementing the safeguards.
Implement safeguards as appropriate.
List five threats to a network that should be considered in a risk analysis.
3
2004
Feedback
Threats to a network that should be considered in a risk analysis include:

‘eavesdropping’

denial of service

viruses

unauthorised access

cable faults

server problems

power disruptions.
List precautions an organisation can take to prevent or minimise the impact of
disastrous events.
Feedback
Precautions include having the following safeguards in place:

fault-tolerant systems

uninterruptible power supplies (UPS)

encryption

virus checkers

RAID systems.
List the options an organisation can use to recover from a disaster.
Feedback
Options to help an organisation to recover from a disaster are:

backup routines

hot or cold sites

standby equipment.
Once the risks to a system have been identified:
All risks should be safeguarded in some way
The backup system is modified to eliminate all risks
Safeguards that are cost effective are considered
Risks that relate to the finance system need to be addressed first
Feedback
4
2004
Correct. Safeguards that are cost effective are considered.
Try again.
Answer true or false.
Management may decide to ignore a risk.
Feedback
Correct, this is true. The cost of prevention may be so high that management
will decide to live with the risk.
Try again.
A disaster recover plan (DRP):
Should be created as part of a risk assessment process
Is only used when there is a fire in the building
Only covers the backup procedures
Is a secret document known only to very senior management
Feedback
Correct. A disaster recovery plan should be created as part of a risk
assessment process.
Try again.
5
2004
Reading
Inside this resource
The readings here will help you develop your knowledge and skills for
determining the risk to network data and providing data recovery services
according to organisational procedures. This will involve an understanding
of:

Reviewing security requirements

Risk analysis

Documenting the disaster recovery process

Implementing backup systems and restoring services.
Icon to print reading
Get reading (.doc 183 KB)
6
2004
Practice
Activity 1: Summarise the impact of
policies
Review the policy and procedures document for the company Call Centres
R US.
Write a report that summarises the impact that these policies will have on risk
analysis and disaster recovery.
Feedback
Your report should have covered the following points:

Disaster and recovery planning is a part of the policy standards.

Risk analysis needs to be undertaken regularly.

Measures to be employed must be cost effective.

Major changes need a further risk assessment.

Backup procedures are documented.

Backup procedures can only be completed after the risk assessment
is completed.

A backup log is specified.

Systems are critical if they impact external clients.

Support staff are able to work on all hardware except for monitors.
Activity 2: Identify built-in facilities
Imagine that a risk analysis determined that customer files are commercially
confidential and need to be protected from unauthorised access.
7
2004
Using any operating system that you have access to (ideally a networking
operating system) identify the built-in facilities that will help stop
unauthorised access to data files.
Feedback
Your response will depend upon the operating system you use, but as an
example, with Windows Server you could have identified:

the use of encryption using public keys

the use of cryptography to protect data transmission

the use of an audit to track file accesses

the restricted use of shared folder permissions

the use of NTFS permissions.
Note that the solutions themselves can then create other risks. For example,
if data is encrypted and the person that knows the password leaves, or is not
available, then the data may be irrecoverable.
Activity 3: Identify support for a UPS
One important disaster recovery option is to make use of uninterruptible
power supplies (UPS) to allow servers to shut down properly.
Review your network operating system and identify any support it may have for
a UPS.
Feedback
For example, with Windows 2000 server:

You should check that the UPS is listed on the Hardware
Compatibility List (HCL).

You can connect the UPS with a serial cable so the UPS can notify
the server that power had been lost.

You can specify the conditions that will trigger a shut down on the
server.

You can set the time internal for sending messages after power
failure.
Note that certain UPS vendors may provide their own software to provide
additional services that work with their product and various operating
systems.
8
2004
Research
A network person is often expected to know or learn about every new piece
of network equipment that comes into the workplace. It is important that
you build a list of resources that relate to your network operating system.
Many of these resources can be found on the Internet or in textbooks.
You should always check that you have access to the original
documentation that came with the system you are using, as it can provide
some very useful information. Most hardware and operating system vendors
have their own website which provides a ‘Support’ section. Searching their
websites with key terms such as the name of your operating system followed
by the word ‘tutorial’ or ‘support’ or ‘help’ will provide many useful links.
Websites
The following websites contain information on risk analysis, disaster
recovery planning and/or links to other similar websites:

http://www.disasterplan.com/

http://www.drj.com/

http://www.mhhe.com

http://www.dir.state.tx.us

http://www.securityauditor.net/
9
2004
Terms
DRP
disaster recovery plan, describing recovery processes to get the business or
organisation back in operation as soon as possible in the event of a
particular disaster; it usually assumes the worst possible scenario and
identifies how the organisation could get up and running in the least possible
time
RAID systems
redundant array of inexpensive disks systems, sometimes also referred to as
mirrored disks; a prevention option to allow access to data to continue even
if a disk fails
SLA
service level agreement, between the network group and the user
community; also contain essential information about the availability and
recovery operations of the network that needed to develop restoration
services
UPS
uninterruptible power supplies, a prevention option to minimise the impact
of power loss or spikes and surges
10
2004
Download