You're about to create your best presentation ever

Disaster Recovery Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Disaster Recovery

Transcript: Disaster Recovery Phases • Continuously monitor the site or facility's fitness for reoccupation • Verify that the site is free from aftereffects of the disaster and that there are no further threats • Ensure that all needed infrastructure services, such as power, water, telecommunications, security, environmental controls, office equipment, and supplies, are operational • Install system hardware, software, and firmware • Establish connectivity between internal and external systems • Test system operations to ensure full functionality • Shut down the contingency system • Terminate contingency operations • Secure, remove, and relocate all sensitive materials at the contingency site • Arrange for operations staff to return to the original facility DISASTER RECOVERY Identify and classify the threats/risks that may lead to disasters Define the resources and processes that ensure business continuity during the disaster Define the reconstitution mechanism to get the business back to normal from the disaster recovery state, after the effects of the disaster are mitigated Identification and Analysis of Disaster Risks/Threats Classification of Risks Based on Relative Weights Building the Risk Assessment Determining the Effects of Disasters Evaluation of Disaster Recovery Mechanisms Activation Phase Sequence of Recovery Activities Recovery Procedures Disaster Recovery Planning • Notification procedures • Damage assessment • Disaster recovery activation planning Reconstitution Phase Execution Phase Activation Phase Notification Procedures Damage Assessment Activation Planning Execution Phase Sequence of Recovery Activities Recovery Procedures Reconstitution Phase Introduction

Disaster Recovery

Transcript: Cyber Threats to Data Hackers - Experts in technology who use their knowledge to break into computers and networks for profit or fun. Insiders - Authorized users who misuse their access. Paid Low Tech Options - External hard drive High Tech Options - Different cloud remote backup services Free Low Tech Options - Built in system recovery tools High Tech Options - Free private backup software, such as CrashPlan or SyncBack Physical Defense of Data fdvfdvfdvfdvfd Virus - Software written with malicious intent Spyware - Software that collects data about the user and transmits it over the internet without the users permission. By: Chris Tumbarello Physical Threats to Data "Danger is just around the corner...Will you be ready?" Cyber Defense of Data Authentication - Method used to confirm user identities. Authorization - Process of providing users access levels and abilities. Firewalls - Hardware or Software used to safeguard a private network. Intrusion Detection Software - Features full-time detection software to identify intruders. Disaster Recovery Ways to Backup Data Best Practices and Solutions Ways to backup Mac - External Hard Drives, Time-Machine Ways to backup PC - External Hard Drives, Built in System Image Backup You should backup your files on an extremely routine basis. Microsoft also recommends that you backup your files before making big changes to your computer’s system. Reference - http://www.recoverysoftware.com/how-often-should-i-backup-my-computer-files/

Disaster Recovery

Transcript: Different types of data : Fixed Data Transient Data Configuration Data Persistent Data Spanning Availability Zones Operating Across Regions DNS Management Database Management Regulatory Issues Organizational Redundancy Identify another cloud provider and establish a backup environment with that provider. Consider all of the following concerns : Storing your portable backups at your secondary cloud provider. Creating machine images that can operate your applications in the secondary provider's virtualized environment. Keeping the machine images up to date with respect to their counterparts with the primary provider. Dependency of application on particular OS and file-system. Backups and data retention Geographic Redundancy Organizational Redundancy No downtime Some natural calamity Two Key Metrics No loss of data Disasters in the cloud Under the surface Tip of the Ice-Berg! "...your ability to recover from a disaster is limited by the frequency and quality of your backups." Backup Management Dream Geographic Redundancy Monitoring Load Balancer Recovery Application Server Recovery Database Recovery Off-site backups Move all data critical for achieving your RPO out of the cloud. Store that data in a portable format. "...practice of making a system capable of surviving unexpected or extraordinary failures." Disaster Recovery Cheap Disaster Management Fire at your data center! Identify an acceptable recovery state. Develop processes and procedures to achieve the recovery state in the event of disaster. Define the criteria that would trigger invocation of the plan. Understanding the level of catastrophic scenario. Disaster Recovery Planning Recovery Time Objective (RTO) "...how much downtime is acceptable in an event of a disaster" AMI Copy Consistent and simple multi-region deployment Scalability Performance Even Higher Availability Recovery Point Objective (RPO) "...how much data are you willing to lose in an event of a disaster"

Disaster Recovery

Transcript: Cooperation DO NOT RUN INTO THE MIDDLE OF A STORM. In case of a hurricane or a tornado, go underground. If a tsunami comes, go to high ground and avoid the beach. When an earthquake strikes, go to low ground and away from windows. When blizzards blow in, wear warm clothes, have snow removal equipment and put rock on the sidewalk. DON'T DRIVE TO MCDONALDS IN THE MIDDLE OF A STORM. (Or any food place) disaster recovery site (DRS) You should have easy access to the news wherever you are. Try to have a working radio and a good stock of batteries if a disaster is coming. If you can't get a radio, if you can, try to meet others to find out the news about the disaster from them. A mobile device might work for certain situations. The early humans alerted their group about important things. We should listen to our friends and learn about any incoming disasters. Allow us to help you get through the toughest times! By: Ishwari, Tasha, Olivia, Ashish, and Rishikesh Disaster Recovery Site (DRS) Media If emergency services tell you to evacuate, EVACUATE IMMEDIATELY immediately . It is not safe when authorities are the ones to tell you to evacuate. Make sure you get everyone out, don't bring all personal belongings. If the place your are going to allows it, make sure to bring your pets, they are still living creatures. Remember to store food somewhere, preferably something that will stay ripe over time. Have foods that don't need to be refrigerated in case the power goes out. Canned food is the best option and you should have a manual can opener in case the power goes out. Make sure to ration your food and not eat it in one day so it lasts. Also, buy water bottles in bulk in case you lose water. It's important to have certain items at home in case of a long term emergency. It's best to have a few flashlights on hand in case the power goes out. Matches and candles are also good for a power outage. (For information on food, see the next slide.) Items You Should have at Home The early humans worked together for survival. They did not have the modern conveniences we have today. They did not do it alone, and if that type of situation will happen, we don't want kill each other. We want to share supplies and gather more to survive a storm. If we share our materials, we'll be able to stay in good health longer. So, share your materials-don't be greedy. Storm Survival Food and Water Evacuation

Disaster Recovery

Transcript: High-tech and low-tech solutions Store your information How often do you have to back up? Like you know most of the students do not back up their documents, but it is important to o it at least once a week. Everything can happen with your computer, software, documents and probably you will need it for future assignments or exams on school. It is recommend to back up after you make any document or once a day. What data you should consider valuable? All of your homework, assignments, information that you get from professors are valuable for the semester but it can be useful for the future. There are different ways to back up your information, you can find applications that are free or paid. Here are some of them: Oracle Dropbox Digitus biometrics Carbonite cloud Amazon Web services Office 365 Student backup Cloud Computing If you are not carefull your data can dissapear. I will present some devices where you can back up your data. You can take advantage of identical digital copies and store them in lots of places like hard drives, CD or DVD, flash drivers storages or even Internet-based backup services that I already mentioned. Also there are programs that secure and save your information in both onsite and over the internet. How important is to maintain and secure your information. There are basically plans that you need to provide: Backup and recovery plans Disaster Recovery plans Storage media and hardware are subject to internal and external forces that can damage your computer. These threats are: infrastructurw failure inadequate hardware maintenance natural disaster hardware malfunction material instability media threats improper storage environment overuse human error Cloud computing use resources and applications hosted on the internet. It makes easy to gain access to the computing power. It also offers availability, greater reliability, improved accessibility, and greater scalability over traditional in house infrastructures. Threats to your data A group of computers that are coordinated to solve a common problem. It links together of the computers to create an another computer to process intensive tasks. Data in your computer Grid Computing Solutions to secure your data Is based on running different machines on one physical devices. Increase availability of applications that can give a higher level of performance depending on the hardware used. Increase energy efficiency by requiring less hardware to run multiple systems or applications. Increase hardware usability by running multiple operating systems on a single computer To recovery your software of your computer, you can use an internal or external hard driver. You can have a recovery program to recover not only your software but files too. Also you need to have an antivirus because it prevent, detect and delete the virus that can causes damage to your software and computer. There are three components that will help you to secure yout data: Grid computing Cloud computing Virtualized computing Backup is to maintain an exact copy of system information. Recovery is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup. Students store a huge amount of data in their computers. Think about this: What would happen if your computer was stolen or destroyed? Would you be able to recover your files? If someone stole your physical computer would they be able to access to your sensitive data? Some programs acquire an username/mail and a password, so you can storage whatever and wherever just by putting your account name and password. In these programs, data is stored in two separated data centers for safety and redundancy. Most of them have reports and notifications that can send you notifications that your backups have completed successfully, or you can choose to receive a notification only if there is an issue. Virtualized Computing Data is effective in student achievement. Students in college need to be able to store data in your PC/ Mac in order to have a easily accesibility to view them Backup and Recovery Plan Disaster Recovery Data Solutions to recover your software Practices High-tech and low-tech solutions Solutions to back up the data

Now you can make any subject more engaging and memorable