How To Install Video Domain_4 System
This commodity covers –
- Overall agreement of the domain
- Of import concepts to focus on from examination point of view
The article is split into 10 parts equally below:
- Part ane – Information Systems operations, Management of IS operations, ITSM
- Part 2 – Service Level Agreements, Operational Level Agreements, Incident and problem Management process
- Office 3 – Roles and responsibilities of support/help desk, Modify direction, Patch management and release management.
- Function iv – Quality Balls (QA) and Overview of DBMS and DBMS architecture
- Part 5 – Data dictionary/Directory system, Database construction, OSI Architecture
- Office 6 – Application of OSI Model in Network Architecture, LAN topology, LAN components
- Office 7 – WAN components, WAN topology, Network performance metrics
- Part 8 – Network Direction bug, Network Management tool and Overview of Disaster Recovery Planning (DRP)
- Part nine – Overview of Recovery Point Objective (RPO) and Recovery Fourth dimension Objective (RTO), additional parameters in defining recovery strategies and various types of recovery strategies
- Part 10 – Unlike recovery/Continuity/response teams and their responsibilities, overview on redundancy and restoration and the various disaster recovery testing methods
- Overall understanding of Domain 4
- What is information Systems operations?
- What are the ways of managing IS operations?
- What is IT service Management Framework (ITSM)?
Overall understanding of the domain:
Weightage – This domain constitutes twenty percentage of the CISA exam (approximately 30 questions)
Covers 23 Cognition statements roofing the process of auditing data systems:-
- Noesis of service management frameworks
- Cognition of service management practices and service level direction
- Cognition of techniques for monitoring third-political party performance and compliance with service agreements and regulatory requirements
- Noesis of enterprise architecture (EA)
- Noesis of the functionality of fundamental engineering science (e.g., hardware and network components, system software, middleware, database management systems)
- Knowledge of system resiliency tools and techniques (e.k., mistake tolerant hardware, elimination of single signal of failure, clustering)
- Knowledge of IT asset direction, software licensing, source lawmaking management and inventory practices
- Knowledge of job scheduling practices, including exception handling
- Knowledge of control techniques that ensure the integrity of system interfaces
- Knowledge of capacity planning and related monitoring tools and techniques
- Noesis of systems operation monitoring processes, tools and techniques (e.grand., network analyzers, system utilization reports, load balancing)
- Knowledge of data backup, storage, maintenance and restoration practices
- Knowledge of database management and optimization practices
- Noesis of data quality (completeness, accurateness, integrity) and life bike management (aging, retention)
- Knowledge of problem and incident direction practices
- Noesis of change management, configuration management, release direction and patch management practices
- Noesis of operational risks and controls related to end-user computing
- Noesis of regulatory, legal, contractual and insurance bug related to disaster recovery
- Knowledge of business organisation impact analysis (BIA) related to disaster recovery planning
- Noesis of the development and maintenance of disaster recovery plans (DRPs)
- Cognition of benefits and drawbacks of alternate processing sites (eastward.g., hot sites, warm sites, cold sites)
- Knowledge of disaster recovery testing methods.
- Knowledge of processes used to invoke the disaster recovery plans (DRPs)
Important concepts from exam point of view:
1.Information Systems operations:
- Responsible for ongoing support for an organizations calculator and IS surround
- plays a disquisitional role in ensuring that computer operations processing requirements are met, cease users are satisfied and information is candy deeply
2.Management of IS operations:
COBIT 5 framework makes clear distinction between governance and management, which are as follows:
- Governance:
- Ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on enterprise objectives to be achieved;
- Setting direction through prioritization and decision making; and monitoring performance and compliance against agreed-on management and objectives.
- Overall governance is the responsibility of the board of directors nether the leadership of the chairperson.
- Specific governance responsibilities may exist delegated to special organizational structures at an appropriate level, peculiarly in larger, complex enterprises.
- Direction:
- Management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives
- Management is the responsibility of the executive management under the leadership of the principal executive officer (CEO).
- IS direction has the overall responsibility for all operations within the Information technology department
3.IT Service Management framework (ITSM):
Refers to the implementation and direction of IT services (people, process and information technology) to run across concern needs
2 frameworks for ITSM:
- Information technology Infrastructure Library (ITIL):
- a reference body of knowledge for service delivery proficient practices
- a comprehensive framework detailed over five volumes – Service strategy, Service design, Service transition, services operations, Continual service comeback
- The primary objective of ITIL is to improve service quality to the business.
- ISO 20000-1:2011 Information technology – Service management
- Requires service providers to implement the plan-practice-check-act (PDCA) methodology
- The main objective is to amend service quality, achievement of the standard certifies organizations every bit having passed auditable practices and processes in ITSM.
- What are Service Level Agreements (SLAs) and Operational Level Agreements (OLAs)?
- What are the tools to monitor efficiency and effectiveness of services provided?
- Exception reports
- Operator problem reports
- Organisation and awarding logs
- Operator work schedule
- ·What is incident management and problem direction?
4.Service Level Agreement and Operational Level Agreement:
- Service Level Understanding:
- The Service Level understanding is a contract between service provider and customer
- SLAs can also be supported past operational level agreements (OLAs)
- Operational Level Understanding:
- OLA is an agreement between the internal support groups of an establishment that supports SLA
- The OLA clearly depicts the functioning and relationship of the internal service groups.
- The main objective of OLA is to ensure that all the support groups provide the intended Service Level Agreement
v.Tools to monitor efficiency and effectiveness of services provided:
- Exception reports:
- These automated reports identify all applications that did not successfully complete or otherwise malfunctioned.
- An excessive number of exceptions may point:
- Poor understanding of business requirements
- Poor application blueprint, development or testing
- Inadequate performance instructions
- Inadequate operations back up
- Inadequate operator preparation or performance monitoring
- Inadequate sequencing of tasks
- Inadequate system configuration
- Inadequate capacity direction
- System and awarding logs:
- Refers to logs generated from diverse systems and applications
- Using this software, the accountant can behave out tests to ensure that:
- Just approved programs access sensitive data
- Only authorized It personnel admission sensitive data
- Software utilities that tin can modify data files and program libraries are used only for authorized purposes
- Canonical programs are run only when scheduled and, conversely, that unauthorized runs do not have place
- The correct data file generation is accessed for production purposes
- Information files are adequately protected
- Operator problem reports – Manual report used by helpdesk to log computer operations problems & resolutions
- Operator work schedules – Study maintained manually by IS direction to assistance in human resource planning to ensure proper staffing of functioning support
o Availability reports – The report that IS auditor apply to check compliance with service level agreements (SLA) requirement for uptime
6.Incident management and problem direction:
- Incident management:
- An Incident is an event that could pb to loss of, or disruption to, an organization's operations, services or functions.
- Incident direction is a term describing the activities of an organization to identify, clarify, and right hazards to forbid a futurity re-occurrence.
- These incidents within a structured organization are normally dealt with past either an (IRT) or an incident management squad (IMT)
- Incident management is reactive and its objective is to respond to and resolve issues restoring normal service (every bit defined by the SLA) as speedily every bit possible.
- Problem management:
- Problem management is the process responsible for managing the lifecycle of all problems that happen or could happen in an IT service.
- The primary objectives of trouble management are to prevent problems and resulting incidents from happening, to eliminate recurring incidents, and to minimize the impact of incidents that cannot be prevented.
· What are the roles and responsibilities of Support/help desk-bound?
· What is change direction and patch direction procedure?
· What is release direction – Major, Small and emergency releases?
7.Support/Help desk-bound – Roles and responsibilities:
- The responsibility of the technical back up part is to provide specialist cognition of production systems to identify and assist in organisation change/development and problem resolution.
- The basic function of the help desk is to be the first, single and central point of contact for users and to follow the incident management process
- The help desk personnel must ensure that all hardware and software incidents that arise are fully documented and escalated based on the priorities established by management
viii.Change management and patch management process:
- Change management:
- used when changing hardware, installing or upgrading to new releases of off-the-shelf applications, installing a software patch and configuring various network devices
- Changes are classified into three types:
- Emergency changes
- Major changes
- Pocket-size changes
- Patch Management:
- an area of systems management that involves acquiring, testing and installing multiple patches (code changes) to an administered computer organization in club to maintain upwardly-to-date software and often to address security risk
- Patch management tasks include the following:
- Maintaining current knowledge of bachelor patches
- Deciding what patches are appropriate for particular systems
- Ensuring that patches are installed properly; testing systems after installation
- Documenting all associated procedures, such as specific configurations required
o Patch Direction – The BEST method for preventing exploitation of arrangement vulnerabilities
- Software release management is the process through which software is made available to users.
- The term "release" is used to describe a collection of authorized changes.
- The release will typically consist of a number of problem fixes and enhancements to the service.
- The release can be of three types:
- Major releases: Commonly contain a significant alter or addition to new functionality. A major upgrade or release commonly supersedes all preceding pocket-sized upgrades.
- Minor releases: Upgrades, commonly containing small enhancements and fixes. A minor upgrade or release usually supersedes all preceding emergency fixes. Minor releases are generally used to fix small-scale reliability or functionality problems that cannot look until the next major release.
- Emergency releases: Ordinarily containing the corrections to a small number of known bug. Emergency releases are fixes that require implementation as chop-chop as possible to prevent pregnant user reanimation to business concern-critical functions
- While change management is the process whereby all changes go through a robust testing and blessing process, release management is the procedure of actually putting the software changes into product.
- What is Quality Assurance (QA)?
- What is Database Management Systems (DBMS)?
- What is DBMS Architecture?
- QA personnel verify that arrangement changes are authorized, tested and implemented in a controlled manner prior to beingness introduced into the production environment co-ordinate to a company'southward change and release direction policies
eleven. Database direction systems (DBMS):
- aids in organizing, controlling and using the data needed by application programs.
- A DBMS provides the facility to create and maintain a well-organized database.
- Primary functions include:
- Reduced data redundancy,
- Decreased access time and
- Bones security over sensitive data.
- Database architecture focuses on the pattern, development, implementation and maintenance of figurer programs that store and organize information for businesses, agencies and institutions.
- A database architect develops and implements software to meet the needs of users. The design of a DBMS depends on its architecture
- Metadata:
- the data (details/schema) of any other data (i.east. data most information)
- The word 'Meta' is the prefix that is generally the technical term for cocky-referential. In other words, we can say that Metadata is the summarized data for the contextual data.
- At that place are three types of metadata:
- Conceptual schema,
- External schema and
- Internal schema
- What is Data Lexicon / Directory system?
- What is Database construction?
- What are the database types?
- Hierarchical database model
- Network database model
- Relational database model
- What is OSI Architecture?
13.Information Systems operations:
- Information Dictionary contains an index and descriptions all of the data stored in database. Directory describes the locations of the information and the access method
- Some of the benefits of using DD/DS include:
- Enhancing documentation
- Providing mutual validation criteria
- Facilitating programming by reducing the needs for data definition
- Standardizing programming methods
- The database structure is the collection of tape type and field blazon definitions that contain your database`.
- There are iii major types of database structure:
- Hierarchical database model,
- Network database model, and
- Relational database model
- Hierarchical database model:
- In this model there is a bureaucracy of parent and child data segments. To create links between them, this model uses parent-child relationships.
- These are i:N (one-to-many) mappings between record types represented by logical trees
- Network database model:
- In the network model, the basic data modeling construct is called a set.
- A set is formed by an owner record type, a member record type and a name.
- A member record blazon can have that part in more than 1 set, so a multi-owner relationship is immune.
- An possessor record type tin can besides be a member or owner in another set up. Usually, a set defines a ane:N relationship, although 1-to-1 (ane:1) is permitted
- Disadvantages of Network database model:
- Structures tin exist extremely complex and difficult to comprehend, modify or reconstruct in case of failure.
- This model is rarely used in current environments.
- The hierarchical and network models do not support high-level queries. The user programs have to navigate the information structures.
- Relational database model
- In Relational database model, the data and relationships among these data are organized in tables.
- A tabular array is a collection of rows, as well known as tuples, and each tuple in a tabular array contains the aforementioned columns. Columns, called domains or attributes, correspond to fields.
- Relational database has the following properties:
- Values are atomic.
- Each row is unique.
- Column values are of the same kind.
- The sequence of columns is insignificant.
- The sequence of rows is insignificant.
- Each column has a unique name
- The relational model is independent from the physical implementation of the data structure, and has many advantages over the hierarchical and network database models. With relational databases, information technology is easier:
- For users to understand and implement a physical database system
- To catechumen from other database structures
- To implement projection and join operations
- To create new relations for applications
- To implement access control over sensitive data
- To modify the database
- A key feature of relational databases is the apply of "normalization"
- Normalization:
- a technique of organizing the data in the database
- a systematic approach of decomposing tables to eliminate data redundancy(repetition) and undesirable characteristics like Insertion, Update and Deletion Anomalies
- OSI model was developed by the International Organisation for Standardization (ISO) in 1984, and it is at present considered every bit an architectural model for the inter-reckoner communications
- OSI model is a reference model that describes how data from a software awarding in 1 computer moves through a physical medium to the software awarding in another calculator.
- The OSI (Open Systems Inter-connection) is a proof-of-concept model composed of seven layers, each specifying particular specialized tasks or functions.
- The OSI model was defined in ISO/IEC 7498, which has the post-obit parts:
- ISO/IEC 7498-1 The Bones Model
- ISO/IEC 7498-two Security Architecture
- ISO/IEC 7498-3 Naming and addressing
- ISO/IEC 7498-iv Management framework
- Each layer is self-contained and relatively contained of the other layers in terms of its particular function
- There are seven OSI layers. Each layer has dissimilar functions. They are:
- Concrete Layer
- Data-Link Layer
- Network Layer
- Ship Layer
- Session Layer
- Presentation Layer
- Application Layer
o The CISA candidate volition not be tested on the specifics of this standard in the test
- The functions of each layer are equally follows:
- Physical Layer – The concrete layer provides the hardware that transmits and receives the chip stream as electrical, optical or radio signals over an appropriate medium or carrier.
- Information-Link Layer – The data link layer is used for the encoding, decoding and logical organization of data bits. Data packets are framed and addressed by this layer, which has two sublayers
- Network Layer – This layer of the assigned the IP addresses and is responsible for routing and forwarding. This layer prepares the packets for the data link layer
- Transport Layer – The send layer provides reliable and transparent transfer of data between end points, end-to-end error recovery and menstruation control.
- Session Layer – The session layer controls the dialogs (sessions) between computers. Information technology establishes, manages and terminates the connections between the local and remote application layers
- Presentation Layer – The presentation layer converts the outgoing information into a format adequate past the network standard and then passes the information to the session layer (Information technology is responsible for translation, compression and encryption)
- Awarding Layer – provides a standard interface for applications that must communicate with devices on the network (e.yard., print files on a network-connected printer, send an email or store information on a file server)
o The OSI layer that perform error detection and encryption – Data Link layer
- What is the application of OSI model in Network Compages?
- What is LAN topology?
- What are the LAN components?
- Repeaters
- Switches
- Hubs
- Routers
- Gateways
- Bridges
xvi.Application of the OSI model in Network Architectures:
- The concepts of the OSI model are used in the design and development of organizations'
network architectures. This includes LANs, WANs, MANs and use of the public Manual
Control Protocol/Internet Protocol (TCP/IP)-based global Cyberspace. - The discussion will focus on:
- LAN
- WAN
- Wireless networks
- Public global internet infrastructure
- Network administration and control
- Applications in a networked surroundings
- On-demand computing
- Local Area Network (LAN):
- a computer network that interconnects computers within a express surface area such as a residence, school, laboratory, university campus or office building
- Media used in LAN:
- Copper (twisted-pairs) circuit:
- Twisted pairs are of two types:
(one) Shielded twisted pair – More attenuation, More than cantankerous talk and more than interference
(ii) unshielded twisted pair – More attenuation, More cantankerous talk and more interference
– Two insulated wires are twisted around each other, with current flowing through them in opposite directions.
– Advantages:
a. This reduces the opportunity for cantankerous talk
b. Cheap
c. Readily bachelor
d. Simple to modify
– Disadvantages:
a. Easy to tap
b. Piece of cake to splice
c. Interference and Noise - Fiber-optics systems:
- It refers to the engineering science and medium used in the transmission of data as pulses of light through a strand or fiber medium made of glass or plastic flashes of light.
- Fiber-optic systems have a low manual loss as compared to twisted-pair circuits.
- Optical fiber is smaller and lighter than metallic cables of the same capacity.
- Cobweb is the preferred choice for high-volume, longer-distance runs
- Radio systems (wireless):
- Data are communicated between devices using depression-powered systems that broadcast (or radiate) and receive electromagnetic signals representing data
o The method of routing traffic through split-cable facilities or duplicate-cable facilities is called "Various routing"
o The type of line media that provides the BEST security for a telecommunication network is "Dedicated lines"
- Star topology
- Motorbus topology
- Ring topology
- Repeaters – concrete layer devices that extend the range of a network or connect two separate
network segments together
- Hubs- physical layer devices that serve as the center of a star-topology network or a network concentrator
- Bridges – data link layer devices that were developed to connect LANs or create two separate
LAN or WAN network segments from a single segment to reduce collision domains
- Switches – data link level devices that can divide and interconnect network segments
and help to reduce collision domains in Ethernet-based networks
- Routers – operate at the OSI network layer by examining network addresses (i.east., routing information encoded in an IP parcel).
- Gateways – are devices that are protocol converters. Typically, they connect and catechumen between
LANs and the mainframe, or between LANs and the Cyberspace, at the application layer of the OSI
- What are the WAN components?
- WAN switches
- Routers
- Modems
- What are WAN technologies?
- Betoken-to-point protocol
- Integrated services digital network (ISDN)
- X.25
- Asynchronous transfer mode
- Frame Relay
- Multiprotocol label switching
- Digital subscriber lines/li>
- Virtual Individual Network
- What are the network functioning metrics?
- Latency
- Throughput
- WAN switches – Information link layer devices used for implementing diverse WAN technologies such equally ATM, point-to-bespeak frame relay and ISDN
- Routers – devices that operate at the network layer of the OSI reference model and provide an interface betwixt unlike network segments on an internal network or connects the internal
network to an external network - Modems (modulator/demodulator)
- Converts computer digital signals into analog information signals and analog data back to digital.
- A main task of the modems at both ends is to maintain their synchronization then the receiving device knows when each byte starts and ends. Ii methods can be used for this purpose:
- Synchronous transmission – a data transfer method in which a continuous stream of information signals is accompanied past timing signals (generated by an electronic clock) to ensure that the transmitter and the receiver are in pace (synchronized) with one some other. The data is sent in blocks (called frames or packets) spaced by fixed time intervals
- Asynchronous transmission – The term asynchronous is used to describe the procedure where transmitted information is encoded with start and stop bits, specifying the beginning and cease of each character. Asynchronous manual works in spurts and must insert a beginning bit before each data grapheme and a stop chip at its termination to inform the receiver where information technology begins and ends.
- Point to point protocol – (PPP) is a data link layer communications protocol used to plant a directly connection between two nodes. PPP is a widely available remote access solution that supports asynchronous and synchronous links, and operates over a wide range of media.
- X.25 – is a standard suite of protocols used for packet-switched communications over a wide expanse network
- Frame Relay – Frame relay is a package-switching telecommunication service designed for price-efficient information transmission for intermittent traffic between LAN and between endpoints in WAN
- Integrated services digital network (ISDN) – It is a set of communication standards for simultaneous digital transmission of phonation, video, information, and other network services over the traditional circuits of the public switched telephone network
- Asynchronous transfer style – ATM is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a concrete medium using digital betoken technology
- Multiprotocol label switching – Multiprotocol characterization switching (MPLS) is a mechanism used within estimator network infrastructures to speed up the time information technology takes a data packet to menstruation from one node to another. It enables computer networks to be faster and easier to manage by using short path labels instead of long network addresses for routing network packets.
- Digital subscriber lines – Digital subscriber line (DSL) is a technology that transports high-bandwidth information over a simple telephone line that is directly connected to a modem. This allows for file-sharing, and the transmission of pictures and graphics, multimedia data, sound and video conferencing and much more
- Virtual Private Network (VPN):
- extends a private network beyond a public network and enables users to send and receive data across shared or public networks every bit if their computing devices were straight continued to the private network. Applications running on an end system (PC, smartphone etc.) across a VPN may therefore benefit from the functionality, security, and management of the private network
- VPN engineering was developed to allow remote users and branch offices to access corporate applications and resource. To ensure security, the private network connectedness is established using an encrypted layered tunneling protocol, and VPN users utilize hallmark methods, including passwords or certificates, to gain access to the VPN.
- There are 3 types of VPNs:
1. Remote-access VPN – Used to connect telecommuters and mobile users to the enterprise WAN in a secure mode; it lowers the bulwark to telecommuting by ensuring that information is reasonably protected on the open Net.
2. Intranet VPN – Used to connect co-operative offices within an enterprise WAN
3. Extranet VPN – Used to give concern partners limited access to each other's corporate network; and example is an automotive manufacturer with its suppliers
21. Network Functioning Metrics:
- Latency: The delay that a bulletin or packet will feel on its style from source to destination. A very like shooting fish in a barrel way to measure latency in a TCP/IP network is to use the ping command.
- Throughput: The quantity of useful work made by the arrangement per unit of time. In telecommunication, it is the number of bytes per second that are passing through a aqueduct.
o Ping control is used to measure the latency
- What are the Network Direction problems?
- Error Direction
- Operation direction
- Configuration direction
- Security management
- Accounting resources
- What are the Network Management tools?
- Response time
- Network monitors
- Reanimation reports
- Uncomplicated Network Management Protocol (SNMP)
- Online monitors
- Help desk reports
- Protocol analyzers
- What is Disaster Recovery Planning (DRP)?
22.Network Management Issues:
A WAN needs to be monitored and managed similarly to a LAN. ISO, as part of its communications modeling effort (ISO/IEC 10040), has defined 5 basic tasks related to network direction:
- Fault management – Detects the devices that present some kind of technical error
- Configuration management – Allows users to know, define and change, remotely, the configuration of any device
- Accounting resource – Holds the records of the resource usage in the WAN (who uses what)
- Functioning management – Monitors usage levels and sets alarms when a threshold has been surpassed
- Security management – Detects suspicious traffic or users, and generates alarms appropriately
23.Network Management tools:
- Response Time – Identify the time necessary for a command entered by users at a terminal to be answered by the host system.
- Downtime Reports – Track the availability of telecommunication line and circuits. Interruptions due to power line failure, traffic, overload, operator error or other anomalous conditions are identified in a downtime reports
- Online Monitors – Cheque information transmissions accuracy and errors. Monitoring can be performed be echo checking and status checking all transmissions, ensuring that messages are not lost or transmitted more than one.
- Network Monitors – Real fourth dimension brandish of network nodes and status.
- Protocol Analyzers – It is a diagnostic tool used for monitoring packets flowing within the network.
- Elementary Network Direction Protocol (SNMP) – It is a TCP/IP-based protocol that monitors and controls different variables throughout the network, manages configurations, and collects statistics on performance and security
- Help desk reports – It is prepared past the help desk, which is staffed or supported by IT technicians trained to handle problems occurring during normal IS usage.
24.Disaster Recovery Planning (DRP):
- DRP is an chemical element of an internal control system established to manage availability and restore critical processes/IT services in the upshot of interruption.
- The purpose of this continuous planning process is
- to ensure that cost-effective controls to foreclose possible Information technology disruptions and
- to recover the IT capacity of the arrangement in the event of a disruption are in place
- DRP is a continuous process. Once the criticality of business processes and supporting Information technology services, systems and data are defined, they are periodically reviewed and revisited
- The ultimate goal of the DRP process is
- to respond to incidents that may impact people and
- the ability of operations to evangelize appurtenances and services to the marketplace and to comply with regulatory requirements
- The departure between BCP and DRP is as follows:
- BCP is focused on keeping the business concern operations running, perhaps in a unlike location or by using unlike tools or processes, after the disaster has happened. DRP is focused on restoring business operations later on the disaster has taken identify.
- BCP often includes Non-IT aspects of the business. DRP often focuses on It systems
o The prerequisite for developing a disaster recovery planning is – to have a management commitment.
o The PRIMARY GOAL of Disaster Recovery planning and Business continuity planning should always be – Safety of Personnel (Human prophylactic get-go)
o Occupant Emergency Program (OEP) provides the response procedures for occupants of a facility in the result a situation poses a threat to the heal and safety of personnel
o The critical first stride in disaster recovery and contingency planning is – to complete a concern impact analysis
o The term "Disaster Recovery" refers to recovery of technological environs
o The BCP is ultimate responsibility of Board of Directors
o Minimizing single points of failure or vulnerabilities of a common disaster is mitigated by
geographically dispersing resources.
o Disaster Recovery planning addresses the technological attribute of business continuity planning
o A disaster recovery plan for an system should focus on reducing the length of recovery time and the cost of recovery.
o The results of tests and drills are the BEST prove of an organization's disaster recovery readiness.
o Fault-tolerant hardware is the simply engineering science that provides continuous and uninterrupted support in the outcome of a disaster or disruption
- What is Recovery Betoken Objective (RPO) and Recovery Time Objective (RTO)?
- What are the boosted parameters in defining the recovery strategy?
- Interruption window
- Service delivery objective (SDO)
- Maximum tolerable outages
- What are the recovery strategies?
- Hot site
- Common cold site
- Warm site
- Reciprocal arrangements
25.Recovery Point Objective (RPO) and Recovery Time Objective (RTO):
o The CISA candidate should be familiar with which recovery strategies would be best with unlike RTO and RPO parameters.
o with different RTO and RPO parameters.
- Recovery Point objective:
- RPO is determined based on the acceptable data loss in case of disruption of operations.
- RPO indicates the earliest point in fourth dimension in which it is acceptable to recover the data. For instance, if the procedure can afford to lose the data up to four hours before disaster, and then the latest backup available should be up to four hours before disaster or break and the transactions that occurred during the RPO period and interruption need to be entered after recovery (known as catch-up data)
- RPO effectively quantifies the permissible amount of information loss in case of disruption.
- Recovery Fourth dimension Objective:
- The RTO is adamant based on the acceptable downtime in example of a disruption of operations.
- It indicates the earliest point in time at which the business operations (and supporting Information technology systems) must resume after disaster
- Both of these concepts are based on time parameters.
- The nearer the time requirements are to the heart (0-ane hours), the higher the toll of the recovery strategies.
- If the RPO is in minutes (lowest possible acceptable data loss), and then data mirroring or real-time replication should be implemented as the recovery strategy.
- If the RTO is in minutes (lowest acceptable time down), then a hot site, dedicated spare servers (and other equipment) and clustering must exist used.
- The beneath table represents the relationship between RPO and RTO:
Disruption hours | Recovery Time Objective | Recovery Point objective |
0 to one hr | Active-Agile clustering | Mirroring (Real-time replication) |
1 to four hours | Active-passive clustering (Hot Standby) | Disk-based back-ups, snapshots, delayed replication, log shipping |
four – 24 hours | Cold Standby | Tape backups, log shipping |
o Recovery Point Objective (RPO) will be deemed critical if it is small
o If the Recovery bespeak objective (RPO) is shut to nil, then it means that the activity is disquisitional and hence the cost of maintaining the environment would exist college
o The Lowest expenditure in terms of recovery arrangement can be through Reciprocal agreement
o A hot site is maintained and data mirroring is implemented, where Recovery Indicate Objective (RPO) is low
o The Best option to back up 24/7 availability is – Data Mirroring
o The metric that describes how long information technology will take to recover a failed arrangement is – Mean time to Repair (MTTR)
26.Additional parameters in defining recovery strategy:
- Interruption window – The maximum period of time the arrangement tin can await from the point of failure to the disquisitional services/applications restoration. Later this fourth dimension, the progressive losses caused past the interruption are unaffordable.
- Service delivery objective (SDO) – Level of services to exist reached during the alternating process fashion until the normal situation is restored. This is directly related to the business needs.
- Maximum tolerable outages – Maximum time the organization can support processing in alternate fashion. Subsequently this indicate, different problems may arise, especially if the alternate SDO is lower than the usual SDO, and the information pending to be updated can become unmanageable.
- A recovery strategy identifies the best way to recover a arrangement (one or many) in case of suspension, including disaster, and provides guidance based on which detailed recovery procedures tin can be developed
- The selection of a recovery strategy would depend on:
- The criticality of the concern process and the applications supporting the processes
- Toll
- Fourth dimension required to recover
- Security
- Recovery strategies based on the adventure level identified for recovery are as follows:
- Hot sites – facilities with space and bones infrastructure and all of the Information technology and communications equipment required to support the critical applications, along with role furniture and equipment for utilize past the staff.
- Warm sites – are complete infrastructures but are partially configured in terms of IT, usually with network connections and essential peripheral equipment such as disk drives, record drives and controllers.
- Cold sites – are facilities with the infinite and basic infrastructure adequate to support resumption of operations, but lacking any Information technology or communications equipment, programs, information or role back up.
- Duplicate information processing facilities
- Mobile sites – are packaged, modular processing facilities mounted on transportable vehicles and kept set up to be delivered and set up at a location that may be specified upon activation
- Reciprocal agreements – are agreements between carve up, but similar, companies to temporarily share their It facilities in the event that 1 visitor loses processing capability. Reciprocal agreements are not considered a viable choice due to the
constraining burden of maintaining hardware and software compatibility betwixt the companies, the complications of maintaining security and privacy compliance during shared operations, and the difficulty of enforcing the agreements should a disagreement arise at the fourth dimension the plan is activated.
- Reciprocal arrangements with other organisations – are agreements between two or
more than organizations with unique equipment or applications. Under the typical understanding, participants promise to provide assistance to each other when an emergency arises.
The CISA candidate should know these recovery strategies and when to use them
An offsite information processing facility having electrical wiring, air-conditioning and flooring, but no computer or communications equipment is a Cold site
- The type of offsite information processing facility is often an acceptable solution for preparing for recovery of non-critical systems and data is a cold site
- Data mirroring and parallel processing are both used to provide virtually-firsthand recoverability for time-sensitive systems and transaction processing
- Organizations should apply off-site storage facilities to maintain back-up of current and critical information within backup files.
- An off-site processing facility should not be hands identifiable externally because easy identification would create an boosted vulnerability for sabotage
- The GREATEST concern when an organization's backup facility is at a warm site is – Timely availability of hardware.
- The GREATEST risk created by a reciprocal agreement for disaster recovery made between ii companies is – Developments may event in hardware and software incompatibility.
- What are the dissimilar Recovery/Continuity/response teams and their responsibilities?
- What is back-upward and restoration?
- Full redundancy
- Incremental redundancy
- Differential redundancy
- What are the disaster recovery testing methods?
- Checklist review
- Parallel examination
- Structured walk-through
- Full interruption test
- Simulation test
28. Dissimilar Recovery/continuity/response teams and their responsibilities :
- Incident response team
- Emergency activity team
- Information security squad
- Damage cess team
- Offsite storage team
- Software team
- Applications team
- Authoritative support team
- Salvage team
- Emergency operations team
- Network recovery team
- Communications squad
- Transportation team
- User hardware squad
- Relocation squad
- Legal affairs team
- Recovery test team
- Training team
o The responsibility of disaster recovery relocation team is to co-ordinate the process of moving from hot site to a new location or to the restored original location.
o The responsibility of offsite storage squad is to obtain, pack and ship media and records to the recovery facilities, as well as establishing and overseeing an offsite storage schedule.
o The responsibility of transportation squad is to locate a recovery site, if one has non been predetermined, and analogous the transport of company employees to the recovery site.
o The responsibility of salvage team is managing the relocation project and conducting a more detailed assessment of the damage to the facilities and equipment.
29.Redundancy and restoration:
- Back-upwardly schemes:
At that place are 3 main schemes for fill-in: - Full back-up – This type of backup scheme copies all files and folders to the backup media, creating one backup fix (with one or more media, depending on media capacity)
- Incremental redundancy – An incremental fill-in copies the files and folders that changed or are new since the final incremental or full fill-in
- Differential dorsum-upwardly – A differential backup will copy all files and folders that take been added or inverse since a total fill-in was performed. This type of backup is faster and requires less media chapters than a full backup and requires simply the last total and differential backup sets to make a full restoration
o The All-time backup strategy for a large database with data supporting online sales is – Weekly full back-upward with daily incremental back-up
xxx.Disaster Recovery testing methods:
- Checklist review – This is a preliminary step to a real test. Recovery checklists are distributed to all members of a recovery team to review and ensure that the checklist is electric current.
- Structured walk-through – Squad members physically implement the plans on paper and review each stride to appraise its effectiveness, identify enhancements, constraints and deficiencies.
- Simulation test – The recovery squad part plays a prepared disaster scenario without activating processing at the recovery site.
- Parallel test – The recovery site is brought to a state of operational readiness, but operations at the chief site continue commonly.
- Full intermission examination – Operations are shut downwards at the primary site and shifted to the recovery site in accordance with the recovery plan; this is the most rigorous form of testing but is expensive and potentially disruptive.
o A continuity program test that uses bodily resource to simulate a system crash to cost-effectively obtain evidence nearly the programme's effectiveness is preparedness test
o The most constructive exam of DRP for organisations having number of offices beyond a broad geographical area is preparedness test
o The type of BCP examination that requires but representatives from each operational expanse to meet to review the program is Walk-through exam
Full interruption test – Operations are shut down at the chief site and shifted to the recovery site in accordance with the recovery program; this is the virtually rigorous form of testing but is expensive and potentially
Height
Got questions about enrollment?
Source: https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/
Posted by: lanoueproatest40.blogspot.com
0 Response to "How To Install Video Domain_4 System"
Post a Comment