Disaster Recovery Planning 2nd Ed.

Strategies for Protecting Critical Information Assets

Jon William Toigo

Publisher: Prentice Hall, 2000, 432 pages

ISBN: 0-13-084506-X

Keywords: IT Security, Information Security

Last modified: Aug. 4, 2021, 7:21 p.m.

Disaster Recovery Planning, Second Edition shows exactly how to implement world-class disaster recovery for today's distributed environments — without paying for expensive consultants or proprietary methodologies! Veteran planner and analyst Jon William Toigo delivers strategies and insights that can be used by any company — large or small.

You'll find comprehensive coverage of disaster recovery techniques that reflect the latest technologies in data storage, networks, server systems, and the Internet:

    • E-business and Web-based disaster planning and recovery
    • Recovery strategies for n-tier client/server and ERP systems — the Achilles heel of modern corporate IT
    • Low-cost steps you can take now to dramatically reduce the risks of disaster
    • Guidelines for leveraging current and next generation IT and network technologies to ensure maximum protection for mission-critical business processes

Disaster Recovery Planning, Second Edition is linked to an accompanying Web site, www.drplanning.org, that will serve as a "living appendix" — keeping IT professionals up-to-date on disaster recovery for years to come!

  • Foreword by Todd Gordon
  • Foreword by George Ferguson
  • Preface
  • Chapter 1: Introduction
    • What Is Disaster Recovery Planning?
    • Purpose of This Book
    • A Working Definition of Disaster
    • The Time Factor in Disaster Recovery
    • The Need for Disaster Recovery Planning
    • The Auditor's View
    • An Imperfect Legal Mandate
    • Building Management Consensus for Disaster Recovery Planning
    • Who Should Write the Plan?
    • A Straightforward, Project-Oriented Approach
    • A Note on Methodology
    • Endnotes
  • Chapter 2: Analyzing the Risk
    • The Purpose of Risk Analysis
    • Identifying and Prioritizing Assets and Functions
    • Collecting Input from End Users
    • A Criticality Spectrum
    • Collecting Data on Outage Costs
    • Identifying Threats to Assets and Functions
    • The Problem with Probability
    • A Few Compelling Statistics
    • Developing Plan Objectives
    • Endnotes
  • Chapter 3: Facility Protection
    • Water Detection
    • Fire Suppression
    • Contamination Reduction
    • Precombustion Detection
    • Power Failure
    • Physical Access Control
    • Endnotes
  • Chapter 4: Data Recovery Planning
    • The Primacy of Data
    • Planning for Data Recovery
    • Identifying the Information Asset
    • Classifying Criticality: Inputs and Outputs
    • Setting a Policy on Data Asset Identification, Classification, and Backup
    • Policy-based Management of Electronic Data via Software
    • Performance Considerations in Backup Software Selection
    • Planning for Backup or Restoral?
    • Electronic Vaulting
    • Remote Mirroring
    • Mirroring Not a Panacea
    • Options for Records Storage
    • Selecting an Off-site Storage Vendor
    • Cost-Justify Off-site Storage
    • Implementing the Data Recovery Plan
    • Final Observations About Data Recovery Planning
    • Endnotes
  • Chapter 5: Strategies for Centralized System Recovery
    • Developing Centralized System Backup Strategies
    • Cautions and Caveats
    • Mainframe Backup Strategies
    • Which Strategy Is Preferred?
    • Selecting a Hot Site
    • The Bottom Line on Centralized System Recovery
    • Endnotes
  • Chapter 6: Strategies for Decentralized System Recovery
    • Distributed Client/Server Computing: The Achilles Heel
    • A Brief Overview of Distributed Computing
    • Contemporary Client/Server Applications
    • Preventive Measures
    • Proactive Measures
    • Planning for Recovery
    • Endnotes
  • Chapter 7: Strategies for End User Recovery
    • Developing an End User Recovery Strategy
    • Options for End User Recovery
    • Emerging Technology: Harnessing Remote Access Capabilities
    • Types of Remote Access
    • Considerations Regarding the Use of Remote Access for End User Recovery
    • Other Issues in End User Recovery
    • Supply Logistics
    • Final Thoughts on End User Recovery Strategies
    • Endnotes
  • Chapter 8: Strategies for Networking Backup
    • What Is Involved in Formulating a Network Recovery Strategy?
    • Analyzing Networks: A Layered Approach
    • Preliminary Activities in Network Recovery Planning
    • Formulating Strategies for Internal Network Recovery
    • Backup Strategies for the Local Loop and Wide Area Network Services
    • Planning for the Restoral of Wide Area Voice and Data Network Links Following a User or Systems Relocation
    • Endnotes
  • Chapter 9: Emergency Decision Making
    • Designating Teams
    • Common Evacuation Project Functions and Teams
    • Common Recovery Project Functions and Teams
    • Relocation and Reentry Project Functions
    • Staffing Teams
    • Developing a Notification Directory
    • Creating the Emergency Management Flowchart
    • Emergency Response
    • Situation Assessment
    • Emergency Operations Center Activation
    • The Recovery Phase
    • The Relocation/Reentry Phase
    • Final Thoughts on Emergency Management Decision Making
    • Endnotes
  • Chapter 10: The Recovery Management Improvement
    • Researching Literature
    • Interviews and Tours
    • Professional DR Organizations
    • Professional Associations
    • Other Milieu Resources
    • Endnotes
  • Chapter 11: Plan Maintenance and Testing
    • Team Education
    • Plan Maintenance
    • Change Management
    • Testing to Maintain the Plan
    • Managing the Results
  • Chapter 12: Conclusion

Reviews

Disaster Recovery Planning

Reviewed by Roland Buresund

Very Good ******** (8 out of 10)

Last modified: Feb. 13, 2011, 6:59 p.m.

A very good book. It got even better in the second edition.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required