《时尚领导者》PPT课件.ppt

上传人:小飞机 文档编号:5676033 上传时间:2023-08-08 格式:PPT 页数:13 大小:273.49KB
返回 下载 相关 举报
《时尚领导者》PPT课件.ppt_第1页
第1页 / 共13页
《时尚领导者》PPT课件.ppt_第2页
第2页 / 共13页
《时尚领导者》PPT课件.ppt_第3页
第3页 / 共13页
《时尚领导者》PPT课件.ppt_第4页
第4页 / 共13页
《时尚领导者》PPT课件.ppt_第5页
第5页 / 共13页
点击查看更多>>
资源描述

《《时尚领导者》PPT课件.ppt》由会员分享,可在线阅读,更多相关《《时尚领导者》PPT课件.ppt(13页珍藏版)》请在三一办公上搜索。

1、Cyber Disaster Recovery,20 years ago Disaster Recovery(D/R)plans protected brick and mortar companies.Today it must protect the growing virtual side of business:E-business.,Why Focus on Incident Preparedness?,20 years ago,survival of the business depended on survival of the brick-and-mortar infrastr

2、uctureEarthquake and hurricane“proof”buildingsRedundant power and communicationsDisaster recovery planningRegulatory requirements,Today,survival of the business also depends on survival of the information infrastructureFirewalls,proxies,access controlsVPNs,encryption,authenticationGrowing regulation

3、SOXHIPPAGLBACA Breach LawPlanning ahead insures against catastrophe,Overview,Traditional disaster recovery(D/R)planning is formal and tested regularlyCyber-D/R planning is less mature,but more necessary todayCyber-D/R requires quick reaction and different skill sets:e.g.,computer forensicsGrowing tr

4、end toward prosecutionCritical infrastructure protection requires better Cyber-D/R planning and response capability,“Traditional”disaster recovery,Business impact analysisDetermine functional areas critical to the businessIdentify critical computer systems and applicationsDetermine disaster recovery

5、 budgetFormal disaster recovery planDisaster declaration criteria and proceduresHot-site and cold-site arrangementsStaff response/call-out plansRecovery proceduresAnnual testing,“Cyber”disaster recovery,Business impact analysisFocusing on impact of“electronic”disasters such as computer security brea

6、ches,instead of“natural”disastersComputer Security Incident Response PlanSimilar in structure to disaster recovery planIncident declaration criteria and proceduresStaff response/call-out plansRecovery proceduresRestore operations“in-place,”not at hot-site Focus on forensic approachQuarterly testing,

7、An observation,ISS responded to as many intrusion incidents in Q4-03 alone as it did all of 2003.75%of the cases have requested forensic evidence considerations for prosecution.These incidents were all different,but they have had recurring themes which make them easier to prepare for.,What happened?

8、,These incidents were not caused by“natural”disasters like fire,flood,or earthquakeA“traditional”disaster recovery plan would not have been sufficientBut the potential effects were the sameAbility to conduct business was impactedReputation could have been damagedFinancial loss could have occurredLos

9、s of customers,The need for good and timely information,During a natural disaster,information is made available to us by television,radio,and government sourcesDuring a cyber-disaster,we are almost always limited to the information we can obtain for ourselvesPlanning and response are improved when w

10、e know ahead of time how these attacks work and how we can defend against them,Obtaining good and timely information,Do you have skills in-house to stay on top of threats and vulnerabilities?Does your staff respond to attacks frequently enough to keep their skills sharp?Do you have(and follow)escala

11、tion,notification and handling procedures?What is the value of a second opinion when you think youre under attack?Can you conduct a forensic investigation without contaminating evidence?What are your regulatory requirements?,Information Security Lifecycle,Put all this in place without impacting user

12、s,What can we add or change to improve our security?,How well are we protected,now and in the future?,Given what we have,how do we handle security incidents?,Goals of an Incident Response,Gain control of any upcoming security problemsFacilitate centralized reporting of incidentsCoordinate response to incidentsRaise security awareness of usersProvide a clearinghouse of relevant computer security informationPromote security policiesProvide liaisons to legal and criminal investigative groups both inside and outside the company,

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 生活休闲 > 在线阅读


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号