Lecture 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 49

CYB 407: Information Disaster

Recovery

Abdulsalam S. Mustafa Ph.D.


Lecture 2
asalamsm@gmail.com 2024
Today’s Lecture
• Principles and Planning
• Contingency Plan Components
• Agency Response Procedures and Continuity
of Operations
• Planning Processes
• Continuity and Recovery Function
• Recap
Security Measures
1. Asset – Valuable Resources
2. Vulnerability – An exploitable weakness
3. Threat- Can cause harm:
Intentional VS Accidental

Automated VS Manual

Chosen VS Indiscriminate
4. Risk- likelihood threat will cause harm
Threat Probability + Vulnerability Severity
5. Counter Measure- Control that reduce risk to an
acceptable level
5
Data Breach Example: Star Wars
Data Breaches in Nigeria
• Nigeria Data Protection Bureau commissioner investigates
more than 100 companies for potential data breaches
(14/02/2023).
• Data breach: FG slams N400m fine on four banks, others
(12/06/2024)
• The Data Protection Commission of Nigeria fined Meta $220
million for breaching data protection, consumer, and privacy
laws (29/07/2024). Details - NDPC

• Data Protection Bill


Disaster Recovery Planning

An IT disaster recovery plan is a documented set of


strategies, procedures, and protocols to help
organizations recover their IT infrastructure and
systems after a disruptive event.

It outlines the steps to restore critical IT services,


recover data and resume normal business operations
following a disaster.

These plan aim to minimize downtime, mitigate risks,


protect data integrity and ensure business continuity
during IT disasters.
Understanding Disasters

● Natural disasters: Earthquakes, floods,


hurricanes, and fires.
● Hardware failures: Malfunctions or breakdowns of
physical components.
● Software errors: Software malfunctions, such as
bugs, glitches, or failures.
● Human errors: Employee mistakes, such as
accidental data deletion or misconfiguration.
Cyberattacks: Malicious activities, such as
ransomware, phishing, and hacking.
Impact of IT Disasters

Financial loss: costs associated with downtime,


data recovery, and lost revenue

Operational downtime: disrupts business


processes and services

Reputational damage: lose customer trust


and reputation

Regulatory non-compliance: fines and legal


consequences
Agency Response Procedures
and Continuity of Operations
Agency Response Procedures 1

Structured steps an agency follows to manage a


crisis or disruption effectively

Activation of Emergency Plans


• Identify the triggering event and activate the disaster
response plan.
• Notify leadership, staff, and relevant stakeholders.

Incident Command System (ICS)


• Assign roles and responsibilities using a. ICS
standardized framework for clear decision-making
and communication.

Communication Protocols
• Establish secure and reliable channels to
communicate updates internally and externally.
• Use communication tools.
Agency Response Procedures 2

Resource Management
• Assess personnel, equipment, funding needs.
• Mobilize resources to support emergency operations.

Public Health and Safety Measures


• Ensure adherence to health guidelines (social distancing).
• Implement evacuation, lockdown, or quarantine measures as
needed.

Documentation and Reporting


• Maintain records of response activities for accountability
and post-event analysis.
Continuity of Operations 1
Continuity of Operations (COOP) is a process that helps
agencies and organizations continue to perform essential
functions during emergencies and disruptions

Identification of Essential Functions


• Prioritize services critical to public safety, security, and
welfare.
• List key operations that must remain functional.

Delegation of Authority
• Pre-assign decision-making responsibilities to ensure
clarity in leadership during crises.

Alternate Worksites
• Designate backup locations or enable remote work to
maintain operations
Continuity of Operations 2
Vital Records and Databases
• Ensure access to critical documents and systems.

Human Capital Management


• Address staff safety and wellness while ensuring adequate
staffing for essential roles

Testing, Training, and Exercises


• Regularly test and update COOP plans.
• Conduct training for staff and simulate scenarios to ensure
preparedness.

Reconstitution
• Plan for a smooth return to normal operations once the crisis
ends.
• Assess damage, restore services, and evaluate the response
for lessons learned.
Cybersecurity Business Continuity Plan
Cloud Disaster Recovery Plan
IT disaster recovery strategies
● Backup and restore to recover lost data
● Cloud-based disaster recovery for scalable and flexible
solutions
● High availability solutions to ensure continuous operations
during failure
● Incident response
● Redundancy to prevent single point of failure
● Replication duplicates date in multiple locations
● Virtualization use virtual machines for quick recovery
Business Continuity Plan Objectives
Business Continuity Plan Steps
Business Continuity Plan Benefits
Contingency Plan Components

•Risk Assessment and Business Impact Analysis (BIA)


•Recovery Objectives
•Disaster Recovery Team
•Data Backup Strategy
•Alternate IT Infrastructure
•Emergency Response Procedures
•System Restoration Procedures
•Communication Plan
•Testing and Maintenance
•Vendor and Partner Coordination
•Compliance and Documentation
•Post-Incident Review and Continuous Improvement
During COVID-19 Pandemic
● Employees worked from home using VPN and collaboration
software
● Secondary or backup-office spaces
● Local co-working spaces
● Cloud services
● Geographically diverse data centres
Challenges for Businesses
Case Study: Star Wars
● Long, long ago in a galaxy far, far away…
● A critical infrastructure object, the Death Star, measured about
120 kilometers in diameter
● Hosting about 1 million of staff (including 25,984 troopers and
342,953 of fleet personnel)
● Was destroyed in the battle of Yavin.
● Due to this incident, the Galactic Empire sustained considerable
losses, including a massive reputational damage, which led to
its eventual downfall.
3 Questions

● How often should disaster recovery plans be updated?

● What role do data backups play in IT disaster recovery?

● How can businesses ensure employee readiness for IT


disasters?
Case Study: Star Wars
● Long, long ago in a galaxy far, far away…
● A critical infrastructure object, the Death Star, measured about
120 kilometers in diameter
● Hosting about 1 million of staff (including 25,984 troopers and
342,953 of fleet personnel)
● Was destroyed in the battle of Yavin.
● Due to this incident, the Galactic Empire sustained considerable
losses, including a massive reputational damage, which led to
its eventual downfall.
● $852 trillion loss
Case Study: Star Wars…

Company Profile
Name: The Galactic Empire
Size: 26,000 destroyers + auxiliary fleet
Business: Galactic Supremacy

The CEO, Emperor Sheev Palpatine, created his Empire on the shards
of the Galactic Republic and the Confederation of Independent Systems,
wallow in corruption and civil wars (in most cases the latter were
orchestrated by the mysterious Darth Sidious, who turned out to be
disguised Palpatine, the Naboo senator and then a chancellor) In the
times of the battle of Yavin the Empire had been around for 19 years and
was the supreme force in the galaxy.
Data Breach Example: Star Wars
Asset: Death Star Plans
Asset: Death Star Plans (Threat)
Security Breach: Response
● How was the security breach handled?
● Threat Mitigation?
Countermeasures: Mitigation
Countermeasures…
Outcome
Star Wars: Lessons Learnt
● Not Mitigating Insider Threats
● Not Implementing Defense in Depth
● Falling for Social Engineering
● Not Putting a Face to Identity
● Not Shutting out Compromised Machines
● Allowing Mnemonic File Names (Weak Password)
● Single Point of Failure
Next Lecture

• Steps of Disaster Recovery Planning


• Role of IT and Network Management in
Disaster Recovery
• Developing the Disaster Recovery
• Executive Support
• DRP Leadership
Resources
● https://www.rit.edu/fa/sites/rit.edu.fa/files/businesscontinuity/DR-
COOPSingleDepartmentalTemplate2020.pdf
● https://www.in.gov/dhs/files/Continuity-of-Operations-Plan-Review.pdf
● https://www.fema.gov/pdf/about/org/ncp/coop/continuity_plan_federal_d_a.pdf
● https://corporate.convergeict.com/wp-content/uploads/2023/07/Business-Continuity-
Management-Policy-Public-Use-3-1-1.pdf
● https://www.sciencedirect.com/science/article/abs/pii/S1756061618303525

You might also like