You're about to create your best presentation ever

Disaster Recovery Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Disaster Recovery

Transcript: Disaster Recovery Phases • Continuously monitor the site or facility's fitness for reoccupation • Verify that the site is free from aftereffects of the disaster and that there are no further threats • Ensure that all needed infrastructure services, such as power, water, telecommunications, security, environmental controls, office equipment, and supplies, are operational • Install system hardware, software, and firmware • Establish connectivity between internal and external systems • Test system operations to ensure full functionality • Shut down the contingency system • Terminate contingency operations • Secure, remove, and relocate all sensitive materials at the contingency site • Arrange for operations staff to return to the original facility DISASTER RECOVERY Identify and classify the threats/risks that may lead to disasters Define the resources and processes that ensure business continuity during the disaster Define the reconstitution mechanism to get the business back to normal from the disaster recovery state, after the effects of the disaster are mitigated Identification and Analysis of Disaster Risks/Threats Classification of Risks Based on Relative Weights Building the Risk Assessment Determining the Effects of Disasters Evaluation of Disaster Recovery Mechanisms Activation Phase Sequence of Recovery Activities Recovery Procedures Disaster Recovery Planning • Notification procedures • Damage assessment • Disaster recovery activation planning Reconstitution Phase Execution Phase Activation Phase Notification Procedures Damage Assessment Activation Planning Execution Phase Sequence of Recovery Activities Recovery Procedures Reconstitution Phase Introduction

DISASTER RECOVERY

Transcript: DISASTER RECOVERY WHAT IS DISASTER RECOVERY In IT a backup or backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. An example is a local business might be owed money by other people and all of that information might be kept on their computer system and if something were to happen to that information they might need a backup stored in another secure location as to access that information when their system fails so they don’t forget about that money. The reason for having a data backup plan would be you have a lot of information that could be worth a lot of money or confidential information on people. Who needs one? You need one! Major companies and small businesses should all have a data backup plan if anything goes wrong. You should get a data backup plan when you have any information that you don’t want to lose it could be anything like bank statements, 1000 word essays, a book you were writing or even the file of the game you have been playing for 10 years. There are different ways of data backups you could use a program like dell data safe, use a cloud network, and you can also just put all your information on a hard drive or disk. How to back up The first traditional backup option that has generally been used for years is to move the data that resides on your hard drive to either another hard drive that is external to your computer system or to some kind of memory device that is capable of storing your data. In years past, this might have been a floppy disk. Today, there is a very strong likelihood that it will be a memory stick. Incredibly, there are memory sticks on the market today that can store around 32 gigabytes of data. This is a staggering sum of data, to say the least. Different types of backing up . A full system backup is designed to allow an entire PC to be recovered . A differential backup copies files that have been created or changed since the last full backup . A reverse delta system will backup a previous version of the program so if the new one is corrupted it will roll back to the old version

Disaster Recovery

Transcript: Cyber Threats to Data Hackers - Experts in technology who use their knowledge to break into computers and networks for profit or fun. Insiders - Authorized users who misuse their access. Paid Low Tech Options - External hard drive High Tech Options - Different cloud remote backup services Free Low Tech Options - Built in system recovery tools High Tech Options - Free private backup software, such as CrashPlan or SyncBack Physical Defense of Data fdvfdvfdvfdvfd Virus - Software written with malicious intent Spyware - Software that collects data about the user and transmits it over the internet without the users permission. By: Chris Tumbarello Physical Threats to Data "Danger is just around the corner...Will you be ready?" Cyber Defense of Data Authentication - Method used to confirm user identities. Authorization - Process of providing users access levels and abilities. Firewalls - Hardware or Software used to safeguard a private network. Intrusion Detection Software - Features full-time detection software to identify intruders. Disaster Recovery Ways to Backup Data Best Practices and Solutions Ways to backup Mac - External Hard Drives, Time-Machine Ways to backup PC - External Hard Drives, Built in System Image Backup You should backup your files on an extremely routine basis. Microsoft also recommends that you backup your files before making big changes to your computer’s system. Reference - http://www.recoverysoftware.com/how-often-should-i-backup-my-computer-files/

Disaster Recovery

Transcript: Different types of data : Fixed Data Transient Data Configuration Data Persistent Data Spanning Availability Zones Operating Across Regions DNS Management Database Management Regulatory Issues Organizational Redundancy Identify another cloud provider and establish a backup environment with that provider. Consider all of the following concerns : Storing your portable backups at your secondary cloud provider. Creating machine images that can operate your applications in the secondary provider's virtualized environment. Keeping the machine images up to date with respect to their counterparts with the primary provider. Dependency of application on particular OS and file-system. Backups and data retention Geographic Redundancy Organizational Redundancy No downtime Some natural calamity Two Key Metrics No loss of data Disasters in the cloud Under the surface Tip of the Ice-Berg! "...your ability to recover from a disaster is limited by the frequency and quality of your backups." Backup Management Dream Geographic Redundancy Monitoring Load Balancer Recovery Application Server Recovery Database Recovery Off-site backups Move all data critical for achieving your RPO out of the cloud. Store that data in a portable format. "...practice of making a system capable of surviving unexpected or extraordinary failures." Disaster Recovery Cheap Disaster Management Fire at your data center! Identify an acceptable recovery state. Develop processes and procedures to achieve the recovery state in the event of disaster. Define the criteria that would trigger invocation of the plan. Understanding the level of catastrophic scenario. Disaster Recovery Planning Recovery Time Objective (RTO) "...how much downtime is acceptable in an event of a disaster" AMI Copy Consistent and simple multi-region deployment Scalability Performance Even Higher Availability Recovery Point Objective (RPO) "...how much data are you willing to lose in an event of a disaster"

Disaster Recovery

Transcript: Cooperation DO NOT RUN INTO THE MIDDLE OF A STORM. In case of a hurricane or a tornado, go underground. If a tsunami comes, go to high ground and avoid the beach. When an earthquake strikes, go to low ground and away from windows. When blizzards blow in, wear warm clothes, have snow removal equipment and put rock on the sidewalk. DON'T DRIVE TO MCDONALDS IN THE MIDDLE OF A STORM. (Or any food place) disaster recovery site (DRS) You should have easy access to the news wherever you are. Try to have a working radio and a good stock of batteries if a disaster is coming. If you can't get a radio, if you can, try to meet others to find out the news about the disaster from them. A mobile device might work for certain situations. The early humans alerted their group about important things. We should listen to our friends and learn about any incoming disasters. Allow us to help you get through the toughest times! By: Ishwari, Tasha, Olivia, Ashish, and Rishikesh Disaster Recovery Site (DRS) Media If emergency services tell you to evacuate, EVACUATE IMMEDIATELY immediately . It is not safe when authorities are the ones to tell you to evacuate. Make sure you get everyone out, don't bring all personal belongings. If the place your are going to allows it, make sure to bring your pets, they are still living creatures. Remember to store food somewhere, preferably something that will stay ripe over time. Have foods that don't need to be refrigerated in case the power goes out. Canned food is the best option and you should have a manual can opener in case the power goes out. Make sure to ration your food and not eat it in one day so it lasts. Also, buy water bottles in bulk in case you lose water. It's important to have certain items at home in case of a long term emergency. It's best to have a few flashlights on hand in case the power goes out. Matches and candles are also good for a power outage. (For information on food, see the next slide.) Items You Should have at Home The early humans worked together for survival. They did not have the modern conveniences we have today. They did not do it alone, and if that type of situation will happen, we don't want kill each other. We want to share supplies and gather more to survive a storm. If we share our materials, we'll be able to stay in good health longer. So, share your materials-don't be greedy. Storm Survival Food and Water Evacuation

Now you can make any subject more engaging and memorable