In this paper, there is a discussion about the primary goals of information security, identification of main types of risks associated with information system, attacks on Information Systems, and Various controls against risks, Recovery measures and conclusion.
Contents
Recovery Measures1
1
1
Introduction4
Discussion4
Goals of Information Security4
Risks5
Risks to Hardware5
Risks to Data and Application5
Disasters6
Controls7
Recovery Measures8
Business Recovery plans8
Recovery Planning and Hot Sites Provider9
Systems Recovery9
Economics of Information Security10
Conclusion10
References11
Recovery Measures
Introduction
Today, the era is of revolution and technology. Each day brings new ideas and discoveries. Technology is advancing day by day and with the advancement of technology there are certain risks and disaster associated with this technology. There is always a chance that any emergency and disaster can occur anytime in organizations. Disaster is the process which can stop the daily routine activities. It is important to recover from those disasters at very first stage, to avoid any losses. Companies can face different threats such as flood, fires, lightening storms, humidity and other natural disasters. There are other disasters too, which are due to the Information Technology such as hackers, human errors, power failures and viruses.
Discussion
“Risks and threats to Information Systems can be managed, by controls and Recovery measures”.
What are the risks associated with Information systems? How these risks can be controlled? What recovery measures should be taken in order to protect Information Systems from disasters?
Goals of Information Security
Primary goals of information security include the protection of information systems. With the advent of new technologies, it is becoming difficult and challenging to secure the information systems. Major goals of information security may include the reduction of risk from the systems. It has to ensure the information confidentiality of data resources. Information technology has to ensure the availability of information resource without any interruption and ensure compliance with policies.
Risks
There are certain risks associated in each organization with the advancement in information technology such as downtime when Information System is not available. Some time to overcome of these risks become expensive. According to the report, $4 billion lost in U.S due to these risks.
Risks to Hardware
There are certain risks, which may cause with hardware such as major damage to the machine due to natural disasters. Black outs and burnouts may other reasons of failure of hardware. These includes total loss of electricity which is the black and sometimes, partial loss of electricity which is brown out. This is also due to the uninterruptible power supply (UPS), and deliberate destruction occurs in various cases.
Risks to Data and Application
The risks associated with the data and applications are mainly destruction, theft and damage. Data can be hacked while transferring from one place to the other. For instance, Amazon.com transferred its data into the cloud which was hacked by hackers. Several servers went offline at once. They raised certain questions regarding security at that time. Cloud computing is adversely affected by the threats due to these hackers and intruders. They can attack personal computers by sending viruses and email spoofing. Various cases have been seen of hacking which can hack the useful information ...