0% found this document useful (0 votes)
24 views26 pages

Disaster Recovery

presentation

Uploaded by

Vihanga Sankalpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views26 pages

Disaster Recovery

presentation

Uploaded by

Vihanga Sankalpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Name : B.

D Imalsha Sadhini

Reg No : E199363

Institute : Esoft Metro Campus


– Panadura Branch

Course : HND in Computing


Acknowledgment
• To everyone who helped me to successfully finish the project , I would like to
extend my appreciation.
• Special Thanks to Mr.K.P.Lahiru Mihidum the lecturer in ESOFT Metro Campus
– Panadura , for his invaluable support and guidance throughout the
development of this Disaster Recovery presentation. Your insightful feedback,
encouragement, and expertise have significantly enhanced the quality of this
work. I deeply appreciate your dedication and assistance.
• To my family and friends for their immense support given through out the
time.
Content …
 Introduction Slide 01 – 02
 Acknowledgement Slide 03
 Network Companies Slide 05
 Network Companies Examples Slide 06
 What is Security ? Slide 07
 Why security matters ? Slide 08
 Importance of Security Slide 09
 Company Network Data Slide 10
 I.T Disasters Slide 11
 Other Security Issues Slide 12 – 14
 Business Disasters Slide 15
Content…
 Disaster Incidents Slide 16
 Recovery Planning Process Slide 17
 Recovery Standards Slide 18
 Recovery Architectures Slide 19
 Benefits Slide 20
 Recovery Technologies Slide 21
 Preventing Disasters Slide 22
 Thank You Slide 23
 Q and A Slide 24
Network
Companies
• Organizations connected
virtually or through a wireless
system across the country/
world
• Ease-of data sharing across
different branches
Network Companies
 Cisco Systems

 Juniper Networks

 Huawei

 Arista Networks
What is Security ?
• Protects the integrity, confidentiality and availability
of data within a network.
• Defend again unauthorized access , data breaches
and other cyber threats.
 Firewalls

 Intrusion Detection System (IDS)

 Virtual Private Networks (VPNs)

 Encryption

 Access Control
Why a Company’s
security matters?

 Protection of Financial Data

 Prevent fraud

 Regulatory Compliance

 Maintaining Trust and reputation

 Data Integrity
Why Security is
Important ?
• Critical aspect of managing and
protecting information.
• Ensure data remains confidential and
accurate.

 Protect Sensitive Data

 Maintain Data Integrity

 Ensure Availability

 Prevent Financial Loss


Company
Network Data
• Information exchanged within the
company’s digital network.

User activity

Communications

System logs
I.T Disasters…
 Significant Problems

 Disrupt /damage
technology systems
 Data loss

 System outages

 Operational Challenges
Virus..

A malicious software
Corrupts data
Steal information
Disrupt operations
Virus Types…

 File Infector Virus


 Macro Virus
 Boot Sector Virus
 Polymorphic Virus
 Metamorphic Virus
 Resident Virus
 Non-Resident Virus
 Direct action Virus
Hacking…

 White Hat Hacking


 Black Hat Hacking
 Gray Hat Hacking
 Red Hat Hacking
Business
Disasters
• Business Disaster is often referred to as an
IT Disaster or IT Incident that disrupts the
technology infrastructure
 Cyber Attacks:
Ransomware , DDOS
Attacks , Data Breaches
 Hardware Failure : Server
Crashes , Storage Failures
 Software Failure : Bugs ,
O/S Failures
 Human Error : Accidental
Deletion
Global network
Disaster
Incident
• WannaCry Ransomware Attack (2017):
This global cyberattack affected thousands
of businesses and public organizations by
encrypting data and demanding ransom,
causing widespread network disruptions.
• CrowdStrike (2024) :
On July 19, 2024, a software update for
their Falcon security platform led to system
crashes on around 8.5 million Windows
devices worldwide. Caused "Blue Screen of
Death," while Mac and Linux systems
remained unaffected.
Disaster
Recovery
Planning
Process
• Involves identifying ,,,

 Potential risks.
 Creating backup
strategies.
 Implementing
failover systems.
 Preparing for quick
recovery through
regular testing and
updates.
Disaster Recovery
Standards

•ISO/IEC 27031: This standard focuses on the guidelines for information and communication technology (ICT) readiness for business
continuity, including disaster recovery.

•ISO/IEC 22301: This standard provides a framework for business continuity management systems (BCMS), outlining requirements for a
robust disaster recovery strategy.

•NIST SP 800-34: The National Institute of Standards and Technology's Special Publication 800-34 offers guidelines for IT contingency
planning, including disaster recovery.

•COBIT: The Control Objectives for Information and Related Technologies framework includes practices for managing and recovering IT
systems, aligning with disaster recovery objectives.

•ITIL: The Information Technology Infrastructure Library provides guidance on IT service management, including disaster recovery and
business continuity practices.
Disaster Recovery
Architectures?

• Specific strategies, systems, and


frameworks that organizations use to
restore IT operations and data after a
disaster…

 Cloud-based Recovery: Leveraging cloud


storage for backups.
 On-Premise and Offsite Recovery: Having
redundant data centers at different
locations.
 Virtualization: Using virtual machines to
restore services quickly.
Minimizing Downtime

Data Protection

Cost-Efficiency

Benefits… Business Continuity

Faster Recovery

Enhanced Security
Backup Solutions

Replication
Disaster
Recovery Failover Systems
Technologies ?
Network Monitoring Tools

Disaster Recovery as a Service


(DRaaS)
Prevent disasters in a
Network ?
Regular Risk Assessments
Network Security Measures
Firewalls
Intrusion Detection/Prevention Systems
(IDS/IPS)
Data Backup and Recovery
Network Segmentation
Access Control
Regular Software Updates
Incident Response Plan
User Training and Awareness
Monitoring and Logging
Disaster Recovery and Business Continuity
Planning
Referencing…
CISCO SYSTEMS- CISCO SYSTEMS, 2024. CISCO FIREPOWER.
AVAILABLE AT: <HTTPS://WWW.CISCO.COM/C/EN/US/PRODUCTS/SECURITY/FIREPOWER-NGFW/INDEX.HTML>

AWS DISASTER RECOVERY - AMAZON WEB SERVICES (AWS), 2024. AWS DISASTER RECOVERY. AVAILABLE AT:
<HTTPS://AWS.AMAZON.COM/DISASTER-RECOVERY/>

VEEAM - VEEAM SOFTWARE, 2024. VEEAM DRAAS. AVAILABLE AT: <HTTPS://WWW.VEEAM.COM/DISASTER-


RECOVERY-AS-A-SERVICE.HTML>

NIST RISK MANAGEMENT FRAMEWORK - NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST),
2020. NIST RISK MANAGEMENT FRAMEWORK. AVAILABLE
AT:<HTTPS://CSRC.NIST.GOV/PUBLICATIONS/DETAIL/SP/800-37/REV-2/FINAL>
VMWARE - VMWARE, 2024. VMWARE VIRTUALIZATION. AVAILABLE AT:
<HTTPS://WWW.VMWARE.COM/SOLUTIONS/VIRTUALIZATION N.HTML>

NAGIOS - NAGIOS ENTERPRISES, 2024. NAGIOS CORE. AVAILABLE AT:


<HTTPS://WWW.NAGIOS.ORG/PROJECTS/NAGIOS-CORE/>
Thank You !!!
Questions &
Answers

You might also like