Disaster recovery is a subset of business continuity activities designed to restore a business to normal operations as quickly as possible following a disruption. The disaster recovery plan may include immediate measures that get operations working again temporarily but the disaster recovery effort is not finished until the organization is completely back to normal. In this video, learn about the disaster recovery process including initial response, staffing, communications, assessment, restoration, and training and awareness.
- [Instructor] Business continuity programs…are designed to keep a business up and running…in the face of a disaster,…but unfortunately they don't always work.…Sometimes, continuity controls fail,…or the sheer magnitude of a disaster…overwhelms the organization's capacity…to continue operations.…That's where disaster recovery begins.…Disaster recovery is a subset…of business continuity activities…designed to restore a business to normal operations…as quickly as possible following a disruption.…
The disaster recovery plan may include immediate measures…that get operations up and running again temporarily,…but the disaster recovery effort…is not finished until the organization…is completely back to normal operations.…The initial response following an emergency disruption…is designed to contain the damage to the organization…and recover whatever capacity may be immediately restored.…The activities during this initial response will vary widely…depending upon the nature of the disaster…and may include activating an alternate processing facility,…
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A completed Learning Path of the series will be available once all the courses are released.
- Using security assessment tools
- Scanning for vulnerabilities
- Threat assessment techniques
- Performing penetration testing
- Reviewing monitor logs
- Performing code reviews
- Performing fuzz testing and misuse case testing
- Analyzing coverage
- Assessing disaster recovery sites and backups
- Testing BC/DR plans
- Collecting security process data and metrics
- Auditing and control management