Disaster Recovery
Featuring 18 Papers as of November 17, 2017
-
Leverage Risk Focused Teams to Strengthen Resilience against Cyber Risks SANS.edu Graduate Student Research
by Dave Bishop - November 17, 2017Information security, risk management, audit and business continuity teams must continue to evolve and mature to combat the growing cyber risks impacting business operations. Each team has standards and frameworks, but they often dont speak the same language or understand how each group intersects in protecting the organization. This research identifies opportunities to reduce resource duplication and integrate information security and risk-focused teams to strengthen the organizations resilience against cyber risks.
-
One Touch Disaster Recovery Solution for Continuity of Operations by Rajat Ravinder Varuni - May 28, 2010
In this publication I present a solution where information is available during or following a disaster.
-
Business Continuity On A Stick by Patrick Kral - August 7, 2008
A technical analysis of using virtual machine technology and USB drives within business continuity and disaster recovery planning.
-
Preparing For A Disaster: Determining the Essential Functions That Should Be Up First by L. Barry Lyons IV, CISSP - October 4, 2007
This paper will summarize the technologies and challenges related to wireless a risk mitigation strategy and determine financial loss over time along with the cost to recover.
-
Business Continuity Planning Concept of Operations by Curtis Keliiaa - July 19, 2006
BCP Command Structure Business Continuity Planning (BCP) is a program that assesses the existing operations, risks, and customer relationships of an organization for the development of organizational preparedness.
-
Beyond Buy-In: The Case for Executive Level Involvement in Developing a Business Continuity Plan by Anne Humphrey - May 17, 2005
The development of a robust business continuity plan is an essential activity for any organization. Too often companies limit executive level participation to approval and funding roles.
-
Computer Security Considerations in Disaster Recovery Planning by Douglas Velliquette - January 17, 2005
The successful implementation of a disaster recovery plan is contingent upon the effectiveness of its design. This paper focuses on specific computer security considerations to be included in disaster planning and recovery strategies.
-
The Virtual Machine: A Tool for Business Continuity Planning by Moe Calvez - August 15, 2004
Disaster recovery, or business continuity planning, is an ever-increasing issue for IT personnel. Why? Well, try to name a company that is beyond dependence on computer and internet technology to maintain a viable business. O.K., besides the Benedictine monks who make that great liqueur or Amish farmers.
-
Disaster Recovery: Survivability &; Security by Linda Ridgway - December 13, 2003
This paper discusses the Disaster Recovery Plan (DRP) and addresses the need to incorporate physical surroundings, data, key personnel, and the organization as an individual entity as well as where the coordination of the Business Continuity Plan (BCP) and DRP coordinator belongs within the organization.
-
The Disaster Recovery Plan by Chad Bahan - August 13, 2003
This paper provides a discussion on business continuity and disaster recovery plans, which are critical components used to ensure that systems essential to the operation of the organization are available when needed.
-
Business Continuity Planning In Difficult Economic Times by Suzanne Widup - July 14, 2003
The primary objective of this paper is to enable an organization to survive a disaster and to reestablish normal business operations.
-
Disaster Recovery Plan Strategies and Processes by Bryan Martin - March 5, 2002
This paper discusses the development, maintenance and testing of the Disaster Recovery Plan, as well as addressing employee education and management procedures to insure provable recovery capability.
-
Disaster Recovery Plan Testing: Cycle the Plan, Plan the Cycle by Guy Krocker - February 28, 2002
This paper takes an in-depth look at the Disaster Recovery Plan (DRP) testing process.
-
Business Resumption Planning: A Progressive Approach by Wayne Freeman - February 24, 2002
The purpose of this paper is to provide a basic roadmap for those endeavoring to implement a Business Resumption Plan (BRP) within their organizations.
-
Systems Survivability by Douglas Lancaster - January 15, 2002
The goal of this paper is to introduce the concept of systems survivability, and explore methods in which this broad concept can be utilized.
-
Requirements for the Design of a Secure Data Center by Christopher Nye - January 15, 2002
This paper covers some of the key elements to be taken into consideration when designing and building a secure data center.
-
Recovering From Disaster: Implementing Disaster Recovery Plans Following Terrorism by Scott Hannig - September 21, 2001
The purpose of this paper is to examine three aspects of disaster recovery, which were found to be the most challenging for many of the companies affected by the 911 attacks: accessing the needed software and technology, staying connected with employees and customers, and the loss of valuable personnel.
-
The Oversight of Physical Security and Contingency Planning by Andy Krupa - August 21, 2001
This paper addresses the importance of physical security in relation to the protection of data systems and sensitive information including the topics of access control, basic physical security practices, and the importance of contingency planning.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact webmaster@sans.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.
SANS.edu Graduate Student Research - This paper was created by a SANS Technology Institute student as part of the graduate program curriculum.