Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

IT Continuity Planning

By Chandra Vennapoosa | on November 6, 2011 |
Disaster Recovery

Reality of Data and Application Protection

Business data and applications are crucial for the success of any commercial organisation. Information related to business needs to be protected from system and network disasters.

Topics

  • Reality of Data
  • IT Continuity Planning
  • Components for IT Continuity
  • IT Infrastructure Continuity Design
  • IT Related Threat to Business

An ideal scenario for complete data protection is to have the network connected to a back-up facility that will monitor any changes in the data. Each time the data changes, the back-up facility will mirror the changes so that network administrators can just reload the data to the network. However, this type of data protection is very costly that even large scale companies tend to back away from this technique.

However, nowadays data back-up facilities that offer restorations points are used wherein the activity between the data and the back-up facility is done in a certain time and date.

A better technique is to asynchronously stream the information to the data facility. It is just a question of bandwidth and businesses can easily take care of that concern.

The application in the network and users on the other hand, will not have the luxury of this effective streaming technique of data. However the restore point can be easily used for restoring applications in the network. The classic example of this technique is on Windows “restore point” application wherein the configuration of a specific date and time is restored.

IT Continuity Planning

Continuity PlanningIT continuity planning in a disaster recovery scenario involves reactive as well as proactive management plan and practices put in place in an organization to ensure 100% delivery of IT services.  IT continuity is a challenge for network developers. Administrators learn much about continuity through disaster recovery. Although it is quite unfortunate for network developers to encounter such a problem, learning from IT disasters is very crucial as the IT services open up to newer attacks while being susceptible to the old problems.

Network administrators have to carefully document every network problem so that they could review the document in the event of disaster. However, what is more important for network developers is to learn how to prevent network disasters altogether. IT continuity is the target for network administrators.

Network developers and users benefit greatly when IT continuity is fully implemented. If the network is secured from any unseen disasters, IT processes are secured and users will have all the information they need anytime.  This in turn will increase productivity. In the end, the business will continue to progress when the support of a strong IT infrastructure.

Before any or after the disaster strikes, a strong IT plan needs to be prepared in order to ensure IT continuity so that the current and future position of the company is secured.

Components for IT Continuity

IT Infrastructure Continuity Design

Designing the infrastructure for IT continuity starts with selecting the right location. Distance from the actual data source should be lessened. Data transmission takes time and physical requirements could greatly prohibit its performance. Environmental risks and unauthorized access should also be considered. Exposures to these types of risks are often missed out but could be disastrous if left unchecked.

As soon as the location is determined, the actual structure has to be considered. If the structure has not been built yet, the size of the structure should be considered. It should be enough for all major and minor components to be integrated. Security of the structure should also be considered.

Communication requirements that could cater WAN, LAN and SAN should also be available. The important component that should be existing is the hi-speed communication as well as routing devices such as switches so that information and data should be properly trafficked.

Lastly, cooling and electrical requirements should be properly designed. Air conditioning should be continuous in the area. To complement this, the electrical supply in the area should be continuous. An independent power source such as UPS should be installed in the network.

IT Related Threat to Business

Network engineers, web and application developers work together to increase the security of the network. Security is done through proper hardware configuration, network applications and other security applications that are installed on every user system. Network and application security companies are constantly researching for new ways to combat the threats that are emerging in different network settings.

However as soon as the remedy is offered to the public, something new definitely comes out on the open as a new attack.  Network administrators try as much as they can to improve security while monitoring the different types of attacks made on the network.

Network attacks could take on different forms but some have prevailed even though different upgrades on the network have been made. Any network administrator has to be aware of the following network threats that could either slowly or abruptly cripple the network:

Media Malware – With the onslaught of different video sharing websites. This has also become the haven of hackers in spreading malware to the network and even personal computers. Hackers can now inject a malicious code in the network through the videos that are watched by users. MPEG files and FLV files could be easily injected with malicious codes. Embedding codes that has malicious wares on a website is also on the rise.

Phishing – The act of stealing passwords and personal information from a user used to be done only through email, specifically spam. Even regular users could stay away from this type of attack. A new form of phishing has been developed and done by simply visiting their website. Network developers have to warn their users about visiting websites that do not really provide the necessary information.

Adware – Although it is not necessarily an attack if done legally, it could pose problems to the network in the sense that it will try to monitor the network activities and use this in their advantage. Adware are usually used to know the preference of the users which is short of monitoring their online activities. Even in legal hands, this will be used to bombard the users with different types of spam. Worst if it is used by hackers as it could be used to infiltrate the network.

Bot Attacks – More and more attacks are not actually done in real time by hackers. Instead, hackers create bots to confuse network security and regular users that they are talking to an actual person. Information might be divulged from the user. There are bots that could reply to the email automatically so that it could ask for possible information. Innocent looking offers such as work at home jobs or opportunity to save money will end up requiring users to give out information. Another type of attack by bots is by increasing the chances of DoS (denial of service). Bots could continuously ask for information in a large scale bases that legitimate requests might not have the proper response because the network is too busy processing requests from bots.

Mobile Attacks – The increasing capacity of smart phones today has opened up the possibility of attacking the network right from the mobile device. Wireless connection by the mobile device seemed innocent but the network has virtually opened its doors to the network attacks as hackers are already in the network without any effort at all. On the other hand, computer to mobile phone attacks have also become possible because of the compatibility of the mobile devices with most computers. Through wireless protocols such as WiFi and Bluetooth network hackers could get inside the system if there is limited security in the network.

Identity Theft – Everyday more and more people are becoming the victim of identity theft. If the network would become vulnerable to identity thieves, information might be extracted to the network and thousands of information would be stolen. In a business setting, upper management will be concerned not only for their employees but for their clients as well. Encryption has to be implemented so that hackers will never be able to access the sensitive and important company information.

External Threats – Hackers may be able to attack the whole network and destroy the system but an efficient back-up plan might be able to restore the network in no time. However external threats could physically destroy the network. This will destroy the physical structuring of the network as well as network applications. Nature related threats or unauthorized human intervention could single-handedly destroy the whole network which would require more resources and time for the upper management as well as network administrators.

These are the typical threats that network administrators and upper management have to be aware of. Security policies that would protect the network from these attacks have to be implemented as soon as possible.

« « Tips to find Job during Recession
PL/Scope and PL/SQL Hierarchical Profiler » »

Author Description

Chandra Vennapoosa

Chandra Vennapoosa, B.S Arch Graduate, Managing Director - Exforsys Inc, Founder of exforsys.com and geekinterview.com. Chandra's mission is "to provide quality career coaching and interview advice for aspiring candidates". She is an avid writer and is also very passionate to help others become professional freelancers. In addition to several online trainings, she has authored the popular book "How to Become a Successful Freelancer"

Free Training

RSSSubscribe 385 Followers
  • Popular
  • Recent
  • Storage and BackUp Strategies

    November 15, 2011 - 0 Comment
  • Producing Disaster Recovery Site

    November 17, 2011 - 0 Comment
  • Disaster Recovery Restoration Tips

    November 18, 2011 - 0 Comment
  • Disaster Recovery and Business Continuity

    October 17, 2011 - 0 Comment
  • Are you ready for Disaster Recovery?

    October 13, 2011 - 0 Comment
  • Is Your Corporate Network Secure and Confidential?

    November 8, 2011 - 0 Comment
  • Network Security Risk Assessment and Measurement

    November 10, 2011 - 0 Comment
  • Effective Business Continuity Planning

    November 12, 2011 - 0 Comment
  • Business Impact Assessment and Recovery Plans

    November 14, 2011 - 0 Comment
  • Disaster Recovery Restoration Tips

    November 18, 2011 - 0 Comment
  • Producing Disaster Recovery Site

    November 17, 2011 - 0 Comment
  • Storage and BackUp Strategies

    November 15, 2011 - 0 Comment
  • Business Impact Assessment and Recovery Plans

    November 14, 2011 - 0 Comment
  • Effective Business Continuity Planning

    November 12, 2011 - 0 Comment
  • Network Security Risk Assessment and Measurement

    November 10, 2011 - 0 Comment
  • Is Your Corporate Network Secure and Confidential?

    November 8, 2011 - 0 Comment
  • Disaster Recovery and Business Continuity

    October 17, 2011 - 0 Comment
  • Are you ready for Disaster Recovery?

    October 13, 2011 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • Disaster Recovery Restoration Tips
  • Producing Disaster Recovery Site
  • Storage and BackUp Strategies
  • Business Impact Assessment and Recovery Plans
  • Effective Business Continuity Planning

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT