Requires Free Membership to View
In this CISSP Essentials Security School lesson, Domain 7, Business Continuity, expert CISSP exam trainer Shon Harris details how disaster recovery processes make it possible to survive a disaster and respond effectively immediately following a disaster event. These plans are usually technology-oriented and focus on getting the network and systems up and running as quickly as possible. Business continuity deals with keeping a company and business after a disaster has been experienced and takes a lot more into account than just technology. More and more companies are developing business continuity into their environment because of the raised awareness of tragic possibilities, but also because of new regulatory requirements that infer executive management obligations for fiscal responsibility.
Before watching the special Domain 7, Business Continuity video below, it's recommended that students first read the Domain 7 spotlight article, which provides an overview of the concepts presented in the video, including disaster recovery planning such as management leadership, goals and requirements, business impact analysis, team building and implementation; backup alternatives including hardware and software approaches, collocation, electronic vaulting, offsite facilities requirements and types; recovery and testing; strategies for executing recovery, carrying out drills and types of plan testing; and emergency response, preserving assets and life, as well as reducing fraud, theft and vandalism.
After watching the video, test your comprehension of this material with our Domain 7, Business Continuity quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.
About Shon Harris:
Shon
Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security
educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides
and tools for lease by training companies, security companies, military organizations, government
sectors and corporations.
Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).
This was first published in September 2008
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation