Recovery Measures

Read Complete Research Material



Recovery Measures



Abstract

In this paper, there is a discussion about the primary goals of information security, identification of main types of risks associated with information system, attacks on Information Systems, and Various controls against risks, Recovery measures and conclusion.

Contents

Recovery Measures1

1

1

Introduction4

Discussion4

Goals of Information Security4

Risks5

Risks to Hardware5

Risks to Data and Application5

Disasters6

Controls7

Recovery Measures8

Business Recovery plans8

Recovery Planning and Hot Sites Provider9

Systems Recovery9

Economics of Information Security10

Conclusion10

References11

Recovery Measures

Introduction

Today, the era is of revolution and technology. Each day brings new ideas and discoveries. Technology is advancing day by day and with the advancement of technology there are certain risks and disaster associated with this technology. There is always a chance that any emergency and disaster can occur anytime in organizations. Disaster is the process which can stop the daily routine activities. It is important to recover from those disasters at very first stage, to avoid any losses. Companies can face different threats such as flood, fires, lightening storms, humidity and other natural disasters. There are other disasters too, which are due to the Information Technology such as hackers, human errors, power failures and viruses.

Discussion

“Risks and threats to Information Systems can be managed, by controls and Recovery measures”.

What are the risks associated with Information systems? How these risks can be controlled? What recovery measures should be taken in order to protect Information Systems from disasters?

Goals of Information Security

Primary goals of information security include the protection of information systems. With the advent of new technologies, it is becoming difficult and challenging to secure the information systems. Major goals of information security may include the reduction of risk from the systems. It has to ensure the information confidentiality of data resources. Information technology has to ensure the availability of information resource without any interruption and ensure compliance with policies.

Risks

There are certain risks associated in each organization with the advancement in information technology such as downtime when Information System is not available. Some time to overcome of these risks become expensive. According to the report, $4 billion lost in U.S due to these risks.

Risks to Hardware

There are certain risks, which may cause with hardware such as major damage to the machine due to natural disasters. Black outs and burnouts may other reasons of failure of hardware. These includes total loss of electricity which is the black and sometimes, partial loss of electricity which is brown out. This is also due to the uninterruptible power supply (UPS), and deliberate destruction occurs in various cases.

Risks to Data and Application

The risks associated with the data and applications are mainly destruction, theft and damage. Data can be hacked while transferring from one place to the other. For instance, Amazon.com transferred its data into the cloud which was hacked by hackers. Several servers went offline at once. They raised certain questions regarding security at that time. Cloud computing is adversely affected by the threats due to these hackers and intruders. They can attack personal computers by sending viruses and email spoofing. Various cases have been seen of hacking which can hack the useful information ...
Related Ads
  • Service Recovery
    www.researchomatic.com...

    Bitner, Booms and Tetreault (1990), Kelley, Hoffman ...

  • Disaster Recovery
    www.researchomatic.com...

    In this light then tape backup, remote sites and off ...

  • Malware
    www.researchomatic.com...

    Then there must exist measures aimed for consequenti ...

  • Swarms
    www.researchomatic.com...

    When a fault has been identified, recovery measur ...

  • Planning Group Policy Sof...
    www.researchomatic.com...

    Control Measures in Recovery Plan15 Co ...