Like this CertiGuide? Get it in PDF format!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Network+
 9  Chapter 1000:  Security in the Real World
      9  II  Minimizing Risk

Previous Topic/Section
Fault Tolerance
Previous Page
Pages in Current Topic/Section
1
Next Page
III  Network Resource Security Models
Next Topic/Section

Disaster Recovery

Natural disasters can also challenge the security of an IT operation. What happens to the business if the data center is destroyed by a tornado? There are two significant things to be concerned with, in planning for disaster recovery:

  1. Ensuring corporate data is not lost.

  2. Ensuring that the corporation gets up and running again as quickly as possible.

You minimize the chances of loss of data by performing regular backups of computer systems, and by storing at least some of those backups off-site where they will not be affected by any physical incidents at your IT operations site. A backup program should also include regularly scheduled tests of restoring data. It is more common than you would think, for a site to have carefully kept backups for months (or even years) without ever needing to use one, and then when the situation does arise, the site finds out that for whatever reason (bad media, a bad tape drive, etc.) their backups are unreadable and their data has been lost.

You enable the company to resume IT operations as quickly as possible after a disaster through activities such as planning for alternate locations at which to do business, arranging in advance for hardware and software replacements that might be needed, and assigning corporate personnel specific duties that they will have in the process of restoring operations.

Disaster recovery planning is an entire IT field in and of itself. Although this overview knowledge is all that’s required for Network+, there is much more you can learn about it through additional research beyond the scope of this book.


Previous Topic/Section
Fault Tolerance
Previous Page
Pages in Current Topic/Section
1
Next Page
III  Network Resource Security Models
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.