During a disaster, organizations may need to shift their computing functions from their primary data center to an alternate facility designed to carry the load when the primary site is unavailable or nonfunctioning. In this video, learn about the different options for alternate processing facilities, including hot sites, warm sites, cold sites, and the offsite storage of backup data.
- [Narrator] During a disaster, organizations may need…to shift their computing functions…from their primary data center to an alternate facility…designed to carry the load when the primary site…is unavailable or nonfunctioning.…Disaster recovery sites are alternate processing facilities…specifically designed for this purpose.…Most of the time, they sit idle, waiting to step in…when an emergency situation arises.…There are three main types of alternate processing facility,…hot sites, cold sites, and warm sites.…
Hot sites are the premier form…of disaster recovery facility.…The are fully operational data centers…that have all of the equipment and data…required to handle operations, ready to run.…Technology staff can activate the hot site…at a moment's notice.…And, in many cases, the hot site…will actually activate itself if the primary site fails.…This provides an unparalleled level of redundancy,…but it also comes at great expense.…
The costs of building and maintaining a hot site…are typically similar to those of running…
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A completed Learning Path of the series will be available once all the courses are released.
- Using security assessment tools
- Scanning for vulnerabilities
- Threat assessment techniques
- Performing penetration testing
- Reviewing monitor logs
- Performing code reviews
- Performing fuzz testing and misuse case testing
- Analyzing coverage
- Assessing disaster recovery sites and backups
- Testing BC/DR plans
- Collecting security process data and metrics
- Auditing and control management