Understand the aspects of disaster recovery Disaster recovery is concerned with the recovery of critical systems in the event of a loss. Be able to discuss the process of recovering a system in the event of a failure A system recovery usually involves restoring the base operating systems, applications, and data files. Be able to discuss the types of alternative sites available for disaster recovery. The three types of sites available for disaster recovery are hot sites, warm sites, and cold sites. Be able to describe the needed components of an incident response policy the incident response policy explains how incidents will be handled, including notification, resources, and escalation. Full Backup A full backup is a complete, …show more content…
It is sad but true: One reason administrators don't put as much security on networks as they could is because they do not want to have to deal with the false positives. As a security administrator, you must seek a balance between being overwhelmed with too much unneeded information and knowing when something out of the ordinary is occurring. Although collecting as much information as possible is important, no one can be blamed for trying to protect their data. While it may be admirable to catch a crook deleting your data, if you can keep the data from being deleted, you will stand a much better chance of still being employed tomorrow.
Step three: Repairing the Damage
Most operating systems provide the ability to create a disaster-recovery process using distribution media or system state files. The user updated all the programs in his computer and also updated his antivirus software; however, he's still reporting unusual behavior in his computer system. The user has probably contracted a worm that has infected the system files in his computer. When the scan is complete, help the user reinstall data files and scan the system again for viruses. ClamAV is an open source solution once available only for Unix-based systems that is now available for most operating systems.
Step four: Documenting and Reporting the …show more content…
Failing to do so can result in privilege creep (also known as access creep, referenced earlier), which occurs when an individual accidentally gains a higher level of access than they would normally be entitled to or need.
Usage auditing: Verifies that systems and software are used appropriately and consistently with organizational policies. A usage audit may entail physically inspecting systems, verifying software configurations, and conducting other activities intended to prove that resources are being used appropriately. Periodically inspecting systems to ensure that software updates and patches are current and that only approved software is installed is a good idea.
Escalation audits: Help ensure that procedures and communications methods are working properly in the event of a problem or issue. These types of audits test your organization to ensure that it has the appropriate procedures, policies, and tools to deal with any problems in the event of an emergency, catastrophe, or other need for management intervention. Disaster recovery plans, business continuity plans, and other plans are tested and verified for accuracy. To successfully complete your assignment, you'll need to inspect every user account and group to verify which user accounts