Business Continuity - Disaster Recovery

CompTIA Network + Domain:

Domain 3.0: Network Operations
Domain 4.0: Network Security

CompTIA Network + Objective

Objective 3.3: Compare and contrast business continuity and disaster recovery techniques.
Objective 4.6: Explain common mitigation techniques and their purposes. 

Overview

Catastrophes of various types such as fires, floods, illness, and terrorism or server crashes, hard drive failure, viruses, and downed networks can upset an organization’s ability to meet business needs causing disruptions to regular operational conditions. It is necessary for businesses, whether large or small, to have plans in place to mitigate the effects of potential catastrophes. Business continuity and disaster recovery plans are important components of any business plan to prevent major disruptions.

The purpose of this lab is to characterize some key points in disaster recovery plans and demonstrate the need for implementation. Students will create and restore a data backup. They will examine the importance of virus and malware protection and test antivirus software.

outcomes:

In this lab, you will learn to:

  1. Create a data backup.
  2. Restore data from a data backup.
  3. Download a virus test file to test antivirus software.

Key terms and descriptions

Data Backups
copying files from a computer’s hard drive onto other digital media that is stored in a secure location
Data Recovery
the process of restoring data that is lost through accidental or no accidental means
Adware
a software program that delivers advertising content in a manner that is unexpected and unwanted by the user
Antivirus (AV)
software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus
Computer Virus
malicious software program that reproduces itself on a single computer and can spread by sharing the infected files and usually infects program executable files
Rootkit
a set of software tools used by an attacker to hide the actions or presence of other
Signature File
file that contains known patterns or sequences of bytes (strings) found in viruses; used by antivirus software to identify malware
Spyware
general term used to describe software that spies on users by gathering information without consent, thus violating their privacy
Trojan
an executable program advertised as performing one activity but actually does something else (or it may perform both the advertised and malicious activities)
Worm
malicious program designed to take advantage of vulnerability in an application or an operating system in order to enter a computer