欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > PPT文档下载  

    《时尚领导者》PPT课件.ppt

    • 资源ID:5676033       资源大小:273.49KB        全文页数:13页
    • 资源格式: PPT        下载积分:15金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要15金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    《时尚领导者》PPT课件.ppt

    Cyber Disaster Recovery,20 years ago Disaster Recovery(D/R)plans protected brick and mortar companies.Today it must protect the growing virtual side of business:E-business.,Why Focus on Incident Preparedness?,20 years ago,survival of the business depended on survival of the brick-and-mortar infrastructureEarthquake and hurricane“proof”buildingsRedundant power and communicationsDisaster recovery planningRegulatory requirements,Today,survival of the business also depends on survival of the information infrastructureFirewalls,proxies,access controlsVPNs,encryption,authenticationGrowing regulationSOXHIPPAGLBACA Breach LawPlanning ahead insures against catastrophe,Overview,Traditional disaster recovery(D/R)planning is formal and tested regularlyCyber-D/R planning is less mature,but more necessary todayCyber-D/R requires quick reaction and different skill sets:e.g.,computer forensicsGrowing trend toward prosecutionCritical infrastructure protection requires better Cyber-D/R planning and response capability,“Traditional”disaster recovery,Business impact analysisDetermine functional areas critical to the businessIdentify critical computer systems and applicationsDetermine disaster recovery budgetFormal disaster recovery planDisaster declaration criteria and proceduresHot-site and cold-site arrangementsStaff response/call-out plansRecovery proceduresAnnual testing,“Cyber”disaster recovery,Business impact analysisFocusing on impact of“electronic”disasters such as computer security breaches,instead of“natural”disastersComputer Security Incident Response PlanSimilar in structure to disaster recovery planIncident declaration criteria and proceduresStaff response/call-out plansRecovery proceduresRestore operations“in-place,”not at hot-site Focus on forensic approachQuarterly testing,An observation,ISS responded to as many intrusion incidents in Q4-03 alone as it did all of 2003.75%of the cases have requested forensic evidence considerations for prosecution.These incidents were all different,but they have had recurring themes which make them easier to prepare for.,What happened?,These incidents were not caused by“natural”disasters like fire,flood,or earthquakeA“traditional”disaster recovery plan would not have been sufficientBut the potential effects were the sameAbility to conduct business was impactedReputation could have been damagedFinancial loss could have occurredLoss of customers,The need for good and timely information,During a natural disaster,information is made available to us by television,radio,and government sourcesDuring a cyber-disaster,we are almost always limited to the information we can obtain for ourselvesPlanning and response are improved when we know ahead of time how these attacks work and how we can defend against them,Obtaining good and timely information,Do you have skills in-house to stay on top of threats and vulnerabilities?Does your staff respond to attacks frequently enough to keep their skills sharp?Do you have(and follow)escalation,notification and handling procedures?What is the value of a second opinion when you think youre under attack?Can you conduct a forensic investigation without contaminating evidence?What are your regulatory requirements?,Information Security Lifecycle,Put all this in place without impacting users,What can we add or change to improve our security?,How well are we protected,now and in the future?,Given what we have,how do we handle security incidents?,Goals of an Incident Response,Gain control of any upcoming security problemsFacilitate centralized reporting of incidentsCoordinate response to incidentsRaise security awareness of usersProvide a clearinghouse of relevant computer security informationPromote security policiesProvide liaisons to legal and criminal investigative groups both inside and outside the company,

    注意事项

    本文(《时尚领导者》PPT课件.ppt)为本站会员(小飞机)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开