337
Index
loss of, 149
proxy, 104
Service continuity, 228
Service interruption measurement, 84
Shadowing, 143
SmartCards, lviii
Smoke detectors, 114
Social engineering, xxxi–xxxii, xxxv
Software
application, 227
backup, 148–49
COTS, 203–4
piracy, 51
system, 227–28
Standby operating systems, 145
State Emergency Operations Center (SEOC),
163
Storage, 137–45
disk replication, 142–43
electronic vaulting, 144
NAS, 145
RAID, 138–41
remote journaling, 141–42
SAN, 145
server clustering, 143–44
shadowing, 143
virtualization, 145
Storage area networks (SANs), 145
Subscription fraud, 51
System logs review, 223
System patches, 206–7
Systems Development Life Cycle (SDLC), 8–
11
defined, 8
development/acquisition phase, 10
disposal phase, 11
implementation phase, 10
needs analysis and initiation phase, 9
operation and maintenance phase, 10–11
phases illustration, 9
System security, 306–7
System software, 227–28
Telecommunications Act of 1996, 14
Telecommunications fraud, 50–51
Testing, 4
budget, 196–97
business recovery process, 194–97
concepts and application, 198
environment, setting, 195
feedback questionnaires, 196
frequency, 199–200
penetration, 223, 233–34
plan confidentiality, 199
results, measurement and interpretation,
199
risks, 198–99
scenarios, 195
scope/objectives development, 194–95
security, 197–201
team, training, 197
thoroughness, 199
traceability, 199
Tests
control/monitor, 196
data, confidentiality, 199
data, preparing, 196
identifying who conducts, 196
Theft(s), 49–53
categories, 50–51
computer component, 50
internal, 49–50
preventative measures, 52–53
proprietary information, 51
proprietary/intellectual property,
prevention, 107
See also Organized/deliberate destruction
Threat Risk Assessment (TRA), 24–25
Threats
determining, 23–27
environmental, 23

Get Business Continuity and Disaster Recovery for InfoSec Managers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.