Security Plus Unit 9
Security Plus Unit 9
Physical security controls are tangible measures designed to protect assets and facilities from
unauthorized access or damage. They are implemented at various levels and boundaries within
an organization to ensure comprehensive security.
Secure Work Restricted areas within a building Access control systems, escorts
Areas where sensitive or classified tasks are for visitors, restricted access
performed. zones.
Hardware Physical protections for individual Locking cabinets for servers, cable
pieces of equipment and devices. locks for laptops, safes for smaller
devices.
Camouflage Techniques
● Landscaping: Using plants and other greenery to hide security features like fences or
buildings.
○ Example: Tall bushes or ornamental grasses that obscure a security fence,
blending it into the environment.
1
Summary
Access Badges
Access badges, including proximity cards and smart cards, are used to secure entry points by
allowing or restricting access to physical spaces. Here’s an overview of how these access
badges work and their common uses:
Proximity Small credit card-sized cards that Used for entry to buildings,
Cards activate when near a proximity card controlled areas within buildings,
reader. They use radio frequency to and various self-serve systems.
transmit data.
Smart Cards Similar to proximity cards but may Can be used for door access and
include additional functionalities and might include proximity card
require insertion into a reader. electronics.
Physical Includes access tokens or devices that Used in various physical access
Tokens function similarly to smart cards and control systems.
proximity cards.
● Functionality:
○ Capacitor and Coil: Proximity cards have a capacitor and a coil that are charged
by the proximity card reader.
○ Radio Frequency: Once charged, the card transmits information to the reader
using radio frequency.
○ Power Source: The card does not require its own power source; it relies on
energy from the reader.
2
● Integration with Other Systems:
○ Turnstiles: Used with turnstiles for controlled access one person at a time,
similar to subway or amusement park entry gates.
○ Multifactor Authentication: Combined with keypads for additional security,
requiring both the card and a PIN for access.
3
Common Applications
● Building Entry: For secure entry points such as main entrances or restricted areas
within buildings.
● Self-Serve Systems: Common in retail and hospitality settings, like gasoline stations or
hotel properties, where users can complete transactions by waving their card or bracelet
in front of a reader.
Remember This!
● Proximity Cards: These are credit card-sized and work by being passed near a reader
to transmit data. Some systems use them in combination with PINs for added security.
4
Receptionist - Visitor Check-In: Manage and verify - Controlled Entry: Ensures
s visitor entry by checking them in. visitors are properly checked
- Access Control: Facilitate visitor entry to before accessing secure areas.
secure areas with appropriate checks. - Ease of Access: Provides a
- Communication: Quickly contact central point for managing
security personnel if necessary. visitor access.
- Immediate Coordination:
Allows for quick contact with
security if issues arise.
Key Points
● Security Guards: Play an active role in managing access, preventing security breaches,
and maintaining records. They also serve as a visible deterrent against unauthorized
access.
● Receptionists: Act as the first line of control for visitor management, ensuring proper
check-in and communication with security when needed.
Remember This!
Video Surveillance: Security cameras are increasingly used in workplaces to monitor various
areas for security and safety purposes. Here’s a breakdown of how video surveillance enhances
security:
5
- Live Monitoring and Recording:
Provides real-time surveillance and
recording for later playback.
Remember This!
Sensors play a crucial role in physical security systems by detecting changes in the
environment. Here’s a summary of common sensor types and their uses:
6
Noise Detects noise levels or - Party Detection: Used by Airbnb hosts to
Detection specific sounds. Can alert on monitor noise levels.
any sound or exceedance of - Sound Specific Detection: Identifies
a noise threshold. specific sounds like smoke alarms or breaking
glass.
Remember This!
Fencing, lighting, and alarms are fundamental elements of physical security that help to
create barriers, deter unauthorized access, and protect property. Here’s a detailed look at each
component:
7
Componen Description Common Uses
t
Alarms Provide alerts for various - Fire Alarms: Detect smoke and/or heat,
threats including fire and triggering fire suppression systems.
unauthorized access. Alarms - Burglary Prevention: Monitor entry points
can be integrated with motion like doors and windows for unauthorized
detection systems for access.
enhanced security. - Motion Detection: Combined with burglary
systems to detect movement.
Remember This!
8
Type Description Common Uses
Zigzag Strong barricades that create a zigzag - Military Bases: Used to prevent
Barricades pattern to slow down vehicles, making vehicles from breaching security
it difficult to ram through. perimeters.
- High-Security Areas: Effective in
areas where vehicle attacks are a
concern.
Remember This!
● Zigzag Barricades: Used primarily in military and high-security areas to prevent vehicle
breaches.
● Bollards: Provide a less obtrusive, yet effective barrier for business entrances and
public spaces, deterring vehicle attacks and protecting against unauthorized access.
Access Control Vestibules are essential for enhancing physical security, particularly in data
centers and other high-security areas. They act as a controlled barrier to prevent unauthorized
access and ensure that only authorized personnel can enter secure areas.
9
Aspect Description
Purpose Serve as a first line of defense by providing a physical barrier between the
outside environment and the valuable assets inside a data center.
Functionality - Prevents Tailgating: Ensures only one person can enter at a time,
trapping anyone attempting to bypass security between the two doors.
Remember This!
● Access Control Vestibules: Provide a secure barrier with two sets of interlocking doors,
enhanced with biometric, RFID, or facial recognition systems, to prevent unauthorized
access and mitigate risks from both external intruders and insiders.
10
Asset Management
Asset management is crucial for tracking and securing valuable assets throughout their
lifecycle. This process encompasses hardware, software, and data assets to ensure they are
properly accounted for, secured, and managed. Here are the core activities of an asset
management program:
Monitoring and Asset - Purpose: Maintain an up-to-date inventory of all assets and
Tracking their locations.
- Process: Perform periodic enumeration of assets, with
auditors reviewing and updating the inventory.
Remember This!
● Asset Management: Involves acquiring, assigning, and tracking assets. Ensure that
assets are properly classified, monitored, and managed to maintain security and
efficiency.
Hardware asset management is essential for tracking and managing physical hardware
assets, such as servers, desktops, laptops, routers, and switches. An effective hardware asset
management system helps mitigate various vulnerabilities and operational issues.
Aspect Description
Architecture and - Purpose: Ensure that hardware purchases fit within the network
Design Weaknesses architecture.
- Process: Implement an approval process to evaluate purchases
beyond just cost, ensuring alignment with overall network design.
11
System Sprawl and - Purpose: Prevent system sprawl and ensure assets are
Undocumented documented and managed.
Assets - Process: Asset management begins before purchase, evaluating
needs, and continues through tracking hardware from acquisition
to disposal.
Mobile Device - Purpose: Reduce the risk of losing track of mobile devices.
Tracking - Process: Record mobile devices when issued and ensure return
upon employee departure to prevent loss.
Remember This!
Software asset management (SAM) is crucial for tracking and managing software licenses,
installations, and usage within an organization. Proper SAM helps ensure compliance with
licensing agreements, optimizes software usage, and minimizes security risks associated with
unpatched or unauthorized software.
Aspect Description
12
- Process: Monitor software usage to prevent overuse or underuse
and ensure that usage aligns with licensing agreements.
Remember This!
Data asset management is essential for managing an organization's data assets, including
databases, files, and other information repositories. It involves defining data ownership,
classification, and access controls while ensuring the integrity, availability, and confidentiality of
data.
Aspect Description
Data Governance - Purpose: Establish policies and procedures for managing data.
- Process: Define data ownership, stewardship, and accountability to
ensure effective management and compliance.
13
Data Availability - Purpose: Ensure data is accessible when needed.
- Process: Implement redundancy, backups, and disaster recovery
plans to maintain data availability.
Remember This!
Platform Diversity
Vendor Using security products from different Implementing two firewalls from
Diversity vendors to reduce the risk of different vendors, e.g., Cisco and
simultaneous vulnerabilities. Check Point, in a screened subnet.
Key Points:
1. Vendor Diversity:
○ Purpose: Reduce the risk that a single vendor’s vulnerability could compromise
the entire system.
14
○
Application: Use products from different vendors for critical components, such
as firewalls or antivirus software.
2. Technology Diversity:
○ Purpose: Implement different technologies to prevent a single technology’s
failure from impacting overall security.
○ Application: Combine various technologies like biometric authentication, CCTV,
and access control systems.
3. Control Diversity:
○ Purpose: Utilize different types of controls to provide comprehensive protection
across multiple security domains.
○ Application: Integrate technical controls (e.g., firewalls), physical controls (e.g.,
secure access points), and managerial/operational controls (e.g., regular security
assessments).
Remember This!
● Platform Diversity is crucial for effective defense in depth. It involves using different
vendors, technologies, and control categories to create a robust security framework. By
ensuring diversity across these aspects, you enhance overall security resilience and
reduce the likelihood of a single point of failure.
Physical Attacks
Physical security controls are essential to protect against various forms of physical attacks. Here
are some common types:
Card Capturing credit card data Broken security seals, Regular inspection of
Skimming using a device called a loose card readers, card readers and ATMs,
skimmer at points of sale card readers extending using security stickers or
like ATMs or gas stations. past panels. tamper-evident seals.
15
Brute Force and Environmental Attacks
Attack Type Description Indicators Prevention
Remember This!
● Card Skimming and Cloning: Skimmers capture data from magnetic strips; cloning
copies this data to another card. Using chip-based cards can reduce risk.
● Brute Force Attacks: These involve physically breaking through barriers or trying all
possible combinations. Reinforced barriers and strong access controls help mitigate
these attacks.
● Environmental Attacks: Disruptions to power, temperature, or other environmental
conditions can be highly damaging. Redundant systems and robust environmental
controls are crucial for protection.
16
Power Provides backup power sources to Dual Power Supplies, Generators,
Redundancy maintain operations during a power UPSs (Uninterruptible Power
outage. Supplies)
Site Implements backup sites to take over Hot, Cold, or Warm Sites
Redundancy if the primary site becomes
unavailable.
Disk A single hard drive failure can crash the Use RAID to provide fault
system if no redundancy is present. tolerance for hard drives.
Server A critical service can fail if the server providing Implement load balancing to
it fails without redundancy. distribute workloads.
Power A single power source failure can cause Use UPSs and generators for
system outages. backup power.
Personnel Tasks performed by a single individual can halt Cross-train staff and
operations if that person is unavailable. document procedures.
Remember This!
● Single Point of Failure: Any component whose failure results in the failure of an entire
system. Redundancy measures, like RAID, load balancing, and backup power sources,
can eliminate many single points of failure.
● Fault Tolerance: Increases system reliability by ensuring that failures in one component
do not lead to system outages.
RAID Configurations
RAID Description Fault Storage Minimum Example
Level Tolerance Efficiency Disks with 500
Required GB Disks
17
redundancy or fault
tolerance.
Remember This!
18
19
.
20
Active/Active Distributes data loads - Optimizes resource - Complex configuration
Load across multiple servers usage - Requires careful
Balancers or networks. All servers - Increases scalability management
are active and share - High availability
the load. Clustering is
often used.
Active/Passive Configuration
Component Description Considerations
Active Node The server currently handling all client - Must be robust and
requests. properly configured
Passive Node The standby server that takes over if the - Must be ready to take over
active node fails. promptly
21
Remember This!
● High Availability aims to minimize downtime and increase system reliability, often
achieved through various forms of redundancy.
● Active/Active Load Balancers distribute traffic across multiple servers to enhance
scalability and availability.
● Active/Passive Load Balancers have one active server and one standby server,
ensuring continuity in case of failure.
● Load Balancing Scheduling can use methods such as round-robin or source IP
address affinity to manage traffic efficiently.
22
Active/Passive Configuration
Performance The NIC team aggregates the - Enhanced network - May require
bandwidth of all the physical performance adjustments for
NICs, allowing the virtual NIC - Improved throughput optimal
to handle more traffic as if it performance
were a single adapter.
23
and removes the faulty NIC still be vulnerable
from the virtual adapter. to network failures
Remember This!
● NIC Teaming combines multiple physical network adapters into a single virtual adapter,
enhancing both performance and redundancy.
● Performance Improvement is achieved through increased bandwidth and load
balancing.
● Fault Tolerance is built in, with the ability to handle NIC failures without service
interruption.
● Load Balancing can be configured with various algorithms to optimize traffic
distribution.
24
Uninterruptible Provides short-term - Protects against - Limited power
Power Supply power during outages or power interruptions duration
(UPS) fluctuations. Allows - Gives time for proper - Maintenance
devices to perform a shutdown or backup required
controlled shutdown or power
bridge the gap until
generators are active.
Remember This!
● UPS provides immediate, short-term power and helps protect against power fluctuations.
● Dual Power Supply ensures continued operation by allowing one supply to take over if
the other fails.
● Generators offer a backup for extended power outages, keeping critical systems
running.
● Managed PDUs allow for detailed monitoring and management of power within data
centers, improving oversight and control.
25
Backup Media Overview
Backup Description Benefits Considerations
Media
Remember This!
26
● Backup Media vary in speed, cost, and capacity. Tape is cost-effective for long-term
storage but slow; Disk provides faster access but at a higher cost; NAS offers networked
storage and ease of access; SAN is ideal for high-speed needs and real-time replication;
and Cloud Storage provides off-site, scalable options but relies on internet connectivity
and incurs ongoing costs.
● RAID is not a substitute for backups. RAID protects against hardware failures but not
against data loss due to events like fires or ransomware attacks. Regular backups are
crucial for data recovery.
Database Backups
Database Description Characteristics
Backup Type
Offline Backup Backs up the database when it is not - Database must be offline
(Cold Backup) operational. Data is static during the - Captures static data
backup.
27
Differential Backs up all data changed - Faster than full backups
Backup since the last full backup. - Requires more storage over time
Remember This!
● Offline Backups offer control and quick access but are vulnerable to physical damage
or theft.
● Online Backups ensure data is accessible and protected off-site, with encryption, but
rely on internet connectivity and incur ongoing costs.
● Online (Hot) Backups keep databases operational but may be more complex, while
Offline (Cold) Backups are simpler but require database downtime.
● Backup types include Full (complete data backup), Differential (changes since last full
backup), Incremental (changes since last backup), and Snapshot/Image (point-in-time
capture).
Full Backups
Aspect Description
Definition A full backup copies all the data specified in the backup program. This
includes all selected files and folders.
Example If you select several folders on the D: drive for backup, a full backup will
include all the data from those folders.
Frequenc Although possible, full backups daily are rare due to time and cost constraints.
y Typically done weekly or monthly.
Benefits
● Complete Data Protection: Captures all data at the point of backup, ensuring no files
are missed.
● Simplifies Restore Process: Restoring from a full backup is straightforward since it
contains all necessary data in one set.
Limitations
28
● Time Consumption: Full backups can be time-consuming, potentially several hours,
affecting system performance and user operations.
● Storage Requirements: Requires a significant amount of storage media, leading to
higher costs and more management effort.
To mitigate the limitations of full backups, organizations often use a combination of full,
incremental, and differential backups:
Incremental Backs up data changed since the last full or Often used after a full
Backup incremental backup. backup to save space
and time.
Differential Backs up data changed since the last full Provides a middle ground
Backup backup. between full and
incremental.
Remember This!
● Full Backups offer comprehensive protection but are time-consuming and require
significant storage.
● Incremental and Differential Backups are used alongside full backups to reduce
backup time and storage requirements.
● A typical backup strategy involves a regular full backup combined with more frequent
incremental or differential backups.
● Ease of Restoration: A full backup is the simplest to restore because it contains all the
data needed. Restoring a full backup involves only retrieving and applying the single
backup set.
● Single Tape Recovery: If the backup is on tape, you only need to restore the single tape
containing the full backup.
Differential Backups
Strategy Overview
29
● Starts with Full Backup: The process begins with a full backup, and subsequent
differential backups capture changes made since that last full backup.
● Example Sequence:
○ Sunday: Full backup
○ Monday: Differential backup (changes since Sunday)
○ Tuesday: Differential backup (changes since Sunday)
○ Wednesday: Differential backup (changes since Sunday)
○ Repeat until the next full backup.
Order of Recovery
Incremental Backups
Strategy Overview
● Starts with Full Backup: The process begins with a full backup, and subsequent
incremental backups capture changes since the last full or incremental backup.
● Example Sequence:
○ Sunday: Full backup
○ Monday: Incremental backup (changes since Sunday)
○ Tuesday: Incremental backup (changes since Monday)
○ Wednesday: Incremental backup (changes since Tuesday)
○ Repeat until the next full backup.
Order of Recovery
Considerations
● Full Backup: Provides the quickest restoration but can be time-consuming and costly if
performed frequently.
● Full/Differential Strategy: Balances backup and recovery time, as differential backups
grow in size over time but only require two tapes for restoration.
30
● Full/Incremental Strategy: Reduces backup time and storage requirements but
requires all incremental backups to be restored in sequence, which can be
time-consuming and complex.
Remember This!
● Full Backup: Fastest recovery if done alone but costly and time-consuming if performed
too frequently.
● Full/Differential Strategy: Reduces restore time compared to incremental backups but
might require larger storage.
● Full/Incremental Strategy: Reduces backup time and storage needs but requires
multiple tapes for recovery and a sequential restoration process.
Backup Time Shorter daily backup times Longer daily backup times
Storage More efficient; only changes since Less efficient; includes all changes
Efficiency last backup since last full backup
Recovery Requires full backup + all Requires full backup + most recent
Complexity subsequent incrementals differential backup
Restoration Time Can be slower; needs to apply Faster; only needs two backups (full
multiple incrementals + latest differential)
Storage Usage Generally less storage usage More storage needed due to larger
differential backups
Recovery More complex due to multiple Simpler and faster recovery process
Simplicity incremental backups
Summary
● Full/Incremental: Opt for this if you need to optimize backup time and storage, and can
handle a more complex recovery process.
● Full/Differential: Choose this if you prioritize fast recovery and can manage the larger
size of differential backups and associated storage costs.
31
Snapshot and Image Backups
Feature Snapshot Backup Image Backup
Disadvantage Only captures state at a single point in Larger size, longer backup times
s time, not a continuous backup
Restoration Revert to the snapshot taken at a Restores the entire system from
specific time the image
Replication
Feature Real-Time Replication Near-Real-Time Replication
Definition Continuous copying of data to a Data is copied with a slight delay from
secondary site the primary site
Advantages Minimal data loss, high availability Reduced bandwidth usage compared to
real-time replication
Disadvantage High resource usage, potential Slight delay can result in some data
s network bandwidth impact loss in case of primary site failure
Journaling
Feature Journaling Application
32
Common Use Databases, file systems, critical applications Database recovery, file
system recovery
Advantages Allows recovery to a specific point, maintains Efficient recovery from data
data integrity corruption or failure
Disadvantage Requires additional storage for the journal, Journal can grow large and
s can add overhead impact performance
Restoration Apply changes from the journal to a previous Recovery involves both the
backup to restore the most recent state backup and journal
Summary
● Snapshot and Image Backups: Useful for capturing and restoring the state of a system
or data at a specific point in time. Snapshots are typically faster for short-term
restoration, while image backups provide comprehensive system restoration.
● Replication: Ensures data availability by creating copies at secondary sites. Real-time
replication offers minimal data loss but may require significant resources, while
near-real-time replication is more resource-efficient but has a slight delay.
● Journaling: Records changes in a sequential log, allowing recovery to a specific state. It
is particularly effective for maintaining data integrity but can add overhead and require
additional storage.
Backup Frequency
Aspect Description
Trade-offs More frequent backups reduce data loss but increase space and
time requirements.
Testing Backups
Aspect Description
Purpose Validates that backups are functional and data can be restored.
33
Types of Tests - Full Restore: Verifies entire backup integrity.
- File Restore: Verifies individual file restorations.
Outcomes - Test Succeeds: Confirms backup process works, though not all backups
may be valid.
- Test Fails: Identifies issues to fix before a real crisis.
Summary
● Backup Frequency: Balances the need to minimize data loss with the practical
considerations of space and time. More frequent backups lead to smaller data loss but
increase costs.
● Testing Backups: Essential for ensuring backups are valid and can be restored.
Regular testing helps identify problems early and prepares administrators for actual
recovery situations.
Remember This!
Backup Policy A document detailing what data to back up, backup frequency, testing
methods, and retention periods.
Offsite vs Onsite - Offsite: Protects against local disasters (e.g., fire, flood).
Storage - Onsite: Provides quick access for recovery.
34
Legal Backups with PII or PHI must comply with relevant laws and
Implications regulations.
Summary
Remember This!
● Backup Policy: Create a comprehensive backup policy covering all aspects of backup
management.
● Geographic Considerations: Always consider environmental, legal, and distance
factors when selecting backup storage locations.
● Encryption: Implement robust encryption practices to safeguard backup data
Business continuity planning ensures that critical business operations can continue and recover
effectively after an outage or disaster. Here's a comparison of the different elements and types
of disasters:
35
disaster. Includes disaster
recovery elements.
Key Points
● Business Continuity Plan (BCP): Essential for maintaining and resuming operations
during and after disruptions. Includes disaster recovery steps.
● Types of Disasters:
○ Environmental: Often uncontrollable but predictable; requires planning for
natural events and their impacts.
○ Human-Made: Include both accidents and malicious actions; planning involves
risk mitigation and response strategies.
36
○ Internal: Address issues within the organization; includes infrastructure and
operational concerns.
○ External: Manage impacts from outside the organization; includes natural
disasters and external disruptions.
Remember This!
A Business Impact Analysis (BIA) is a crucial component of business continuity planning (BCP).
It helps organizations identify and prioritize mission-essential functions and critical systems to
ensure they can continue operations during and after a disaster. Here’s an overview of the key
concepts involved:
Critical Systems and components that Web servers, database servers, and
Systems support mission-essential network infrastructure in an
functions. e-commerce setup.
Maximum The maximum allowable time that For online sales, if the maximum
Downtime a system or function can be allowable outage is five hours, then all
Limit non-operational before it systems supporting online sales must
significantly impacts the be restored within that time frame.
organization.
37
Potential The financial or operational impact Example: An average loss of $5,000
Losses that could result from a disruption per hour due to halted online sales.
in critical systems.
Example Scenario
E-Commerce Business:
● Mission-Essential Functions:
○ Serving webpages
○ Processing purchases
○ Sending email confirmations
● Vulnerable Business Processes:
○ Shopping cart path
● Critical Systems:
○ Web servers
○ Database servers
○ Network infrastructure
● Maximum Downtime Limit:
○ Five hours for online sales
● Scenarios:
○ Hurricane impacts the data center
○ Cyberattack targeting the website
● Potential Losses:
○ $5,000 per hour if online sales are disrupted
Remember This!
A site risk assessment evaluates specific risks associated with a particular location. Unlike
general risk assessments, which might cover broad categories, a site risk assessment focuses
on the unique risks and requirements of individual sites. Here’s how it differs based on location
and focus:
38
Environmental Risks specific to the physical Florida sites: hurricanes, floods;
Risks environment of a site. San Francisco sites:
earthquakes.
Mission-Essentia Critical functions unique to each site. Online sales site: website
l Functions operations, transaction
processing; Warehousing site:
inventory management,
shipping.
Examples of - Data breach costs: Average cost of a High costs of breaches could
Impact data breach was $4.35 million globally exceed millions, highlighting the
in 2022. U.S. average: $9.44 million; financial and reputational
healthcare industry: $10.10 million. impacts of data breaches.
The RTO defines the maximum allowable time to restore a system or function after an outage.
It’s crucial for minimizing downtime and ensuring that the business can continue operations.
Definition Maximum time allowed for system Web server for online sales: RTO of
restoration after an outage. 5 minutes; Internal database
server: RTO of 24 hours.
Purpose Ensures that systems are restored within a An online sales website’s revenue
time frame that prevents unacceptable generation might necessitate a very
impact on the organization. short RTO.
The RPO defines the maximum acceptable amount of data loss measured in time. It determines
how frequently backups should occur to ensure data can be restored to a point that meets the
organization's needs.
39
Definition Amount of data that can be lost due to Weekly backups: RPO of one week;
an outage, measured from the most Online transaction database: RPO up
recent backup. to the minute of failure.
Purpose Ensures that data loss is minimized Ensures frequent backups for critical
according to the organization’s data to meet minimal data loss
tolerance and operational needs. requirements.
Remember This!
Understanding MTBF and MTTR is crucial for assessing and planning for system reliability and
maintenance. Here’s a breakdown of each term:
40
Mean Time Measures the average Indicates the reliability If a hard disk has an
Between time between failures of of a system or MTBF of 100,000
Failures a system or component. component. Higher hours, it means, on
(MTBF) Typically expressed in MTBF means more average, one failure is
hours. reliable. expected every 100,000
hours.
Mean Time Measures the average Used to gauge the If the MTTR for a server
To Repair time taken to repair or efficiency of repair is 4 hours, it means, on
(MTTR) restore a failed system processes. It does not average, it takes 4
or component. guarantee repair times hours to fix and restore
for every instance. the server.
Remember This!
● MTBF (Mean Time Between Failures): Provides an estimate of how often a system or
component will fail. Higher MTBF indicates greater reliability.
● MTTR (Mean Time To Repair): Refers to the average time required to restore a system
or component after a failure. It is crucial for planning recovery and maintenance efforts.
41
Continuity of Operations Planning (COOP) and Site Resiliency
1. Hot Site
● Description: A fully operational site that can take over immediately. It includes all the
necessary equipment, software, and data.
● Characteristics:
○ Operational 24/7.
○ Contains up-to-date data.
○ Can take over functionality quickly after a primary site failure.
● Recovery Time: Minimal, typically from a few minutes to an hour.
● Cost: High, due to constant maintenance and up-to-date data.
● Use Case: Best for high-availability requirements where minimal downtime is crucial.
42
Operational Time 24/7
Cost High
2. Cold Site
● Description: A basic facility that requires power, connectivity, and physical space.
Equipment and data need to be brought to the site when needed.
● Characteristics:
○ Requires power and connectivity but lacks equipment and data.
○ Activation involves setting up hardware, software, and data.
● Recovery Time: Longer, as setup is needed.
● Cost: Low, due to minimal maintenance.
● Use Case: Suitable for organizations that can tolerate longer recovery times and have
budget constraints.
Cost Low
Ideal For Organizations with longer recovery windows and lower budgets
3. Warm Site
● Description: A compromise between hot and cold sites. Contains necessary hardware
but may not have up-to-date data.
● Characteristics:
○ Equipped with hardware and basic infrastructure.
○ Requires data and software to be copied or installed upon activation.
● Recovery Time: Intermediate, as data and software need to be transferred.
● Cost: Moderate, balancing between maintenance and setup requirements.
● Use Case: Suitable for organizations needing a balance between recovery speed and
cost.
43
Aspect Warm Site
Cost Moderate
● Mobile Site: A transportable recovery site that can be moved to different locations as
needed.
● Mirrored Site: An exact duplicate of the primary site that maintains real-time
synchronization.
Geographic Considerations
When selecting recovery sites, consider geographic dispersion to prevent both the primary and
recovery sites from being affected by the same disaster. Sites should be far enough apart to
minimize the risk of simultaneous outages due to similar events.
Remember This!
● Hot Site: Provides the quickest recovery with up-to-date data but is the most expensive.
● Cold Site: Least expensive, requires setup and data transfer, and has a longer recovery
time.
● Warm Site: Balances between hot and cold sites in terms of cost and recovery speed.
Restoration Order
● Least Critical Functions First: Return less critical functions to the primary site before
moving more critical ones. This allows you to identify and address any issues with the
site before affecting essential operations.
● Reason for Least Critical Functions First: Testing and resolving issues with
non-essential functions can prevent disruptions to mission-critical functions.
44
Type of Characteristics Cost Recovery Time
Recovery
Site
Hot Site Fully operational 24/7, includes all Expensiv Shortest (minutes
equipment, software, and up-to-date data. e to an hour)
Can take over quickly.
Remember This!
Disaster Recovery
45
Component Description Example
Activation The process of initiating the DRP Activating the plan immediately
based on the type and timing of after an earthquake versus before
the disaster. an expected hurricane.
Recovery of Critical The process of restoring systems Restoring and testing the
Systems based on their priority and functionality of key servers as per
verifying that approved changes the DRP prioritization.
are included.
46
Recover Critical Begin the process of restoring Follow the hierarchical list to
Systems systems based on their prioritization. restore systems, review change
management documentation.
Test Recovered Verify that restored systems function Conduct tests to ensure systems
Systems correctly and meet performance are operational and meet
standards. required performance metrics.
Multiple Separate plans for different types of Individual plans for hurricanes,
DRPs disasters or specific systems. tornadoes, and separate plans for
servers and databases.
4. Importance of Prioritization
Aspect Description Example
System The order in which systems are Restoring a system that generates
Prioritization restored based on their criticality and significant revenue before less
impact on business operations. critical internal systems.
47
Tabletop Discussion-based exercises where To discuss and evaluate responses,
Exercises participants review hypothetical roles, and decision-making
scenarios in a classroom or processes; to identify flaws in the
conference setting. plan and make necessary updates.
Simulations Functional exercises conducted in a To test and verify the steps of the
simulated environment to test the plan, assess how well the plan
operational aspects of the plan works, and measure the time
without impacting real systems. required to execute the plan.
Parallel Involves running the disaster To confirm that the recovery site can
Processing recovery site alongside the primary operate effectively in parallel with the
site to ensure both sites are main site without disrupting
functioning properly. operations.
Failover Tests that involve shutting down the To test the full functionality and
Tests primary site and evaluating whether effectiveness of the failover site
the recovery site can handle the load. under real conditions, ensuring it can
handle the operational load.
Outcome Validates the adequacy of the plan, identifies flaws, and prompts
revisions if necessary.
Simulation Details
Feature Description
Scenario Testing involves simulating system failures and recovery procedures without
affecting actual systems.
Outcom Verifies that the plan works as intended and measures the execution time.
e
48
Parallel Processing Details
Feature Description
Format Operates the recovery site concurrently with the primary site.
Scenario Ensures that the recovery site is functioning properly alongside the main site.
Outcom Confirms operational effectiveness of the recovery site without disrupting normal
e operations.
Format Shuts down the primary site and tests whether the recovery site can assume its
operations effectively.
Scenario Evaluates the recovery site under real conditions and load.
Outcom Determines if the failover site is capable of handling the load and restores
e operations as planned.
Parallel Operates recovery site alongside the primary site, tests functional
Processing capabilities in parallel.
Failover Tests Shuts down the primary site, tests the full capability and performance of
the recovery site under real conditions.
People Assessing the human resources To ensure the organization has the
needed, including skills, hiring, expertise and staffing levels needed
training, and retaining talent. to support operations and growth.
49
Technology Determining the hardware, software, To avoid bottlenecks, ensure high
and network resources needed to availability, and maintain optimal
support operations and future performance levels.
demand.
Workforce Analyzing current workforce skills To determine the skills and staffing
Analysis and identifying gaps. levels required to meet current and
future needs.
Forecasting Estimating future human resource To plan for hiring, training, and
requirements based on growth, retaining the right talent to support
new projects, or changes. organizational objectives.
Talent Hiring, training, and retaining the To ensure the organization has the
Management right talent. necessary expertise to achieve its
goals and manage growth effectively.
Hardware Estimating the computing power To ensure the physical resources can
and storage needed. handle current and future workloads.
50
Component Description Purpose
Capacity Analyzing current infrastructure To address and plan for future capacity
Analysis capacity and identifying potential needs and prevent limitations.
constraints.
Summary of Chapter 9
Cable Locks Secure mobile devices like Prevent theft of Easy to implement
laptops. portable devices. and cost-effective.
51
combined with PINs for
enhanced security.
52
RAID (Redundant Disk subsystems that Improve data Protects against
Array of provide fault tolerance. availability and fault disk failures and
Independent RAID-1 mirrors data, tolerance. enhances data
Disks) RAID-5 and RAID-6 use reliability.
parity.
Offline Uses tapes, local disks, Store backups for data Reliable and often used
Backups or drives in a NAS/SAN. recovery. for traditional backup
methods.
Incremental Backs up only changes Minimizes backup time Efficient for daily
Backup since the last backup. and storage needs. backups.
Differential Backs up changes since Reduces restore time Balances backup time
Backup the last full backup. compared to and recovery time.
incremental backups.
53
Off-Site Stored at a remote Protects against Ensures backup safety
Backup location to avoid impact site-specific disasters. from local incidents.
from local disasters.
Encryption Protects backup data Secure sensitive data. Protects data integrity
from unauthorized and confidentiality.
access.
Hot Site Fully equipped site that Minimize downtime Most effective but
can be operational within and ensure rapid costly solution.
60 minutes. recovery.
54
Warm Site Partially equipped site with Balance between Offers a compromise
infrastructure and some cost and recovery between hot and
hardware. time. cold sites.
Cold Site Basic site with power and Lowest cost Requires setup time
connectivity but no recovery solution. but is the least
pre-installed equipment. expensive.
Testing Types Includes tabletop Validate and refine Ensures plans are
exercises, simulations, disaster recovery effective and
parallel processing, and plans. functional
failover tests.
55