CISA Quick Tips 08-1112
1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key.
2. A good Backup and recovery System should have following features:
i. Backup should be properly labeled.
ii. Retention period should be clearly mentioned
iii. System log and application log should be separately stored
v. Periodic audit of the Backup & Recovery System should be there.
vi. Backup and Recovery Manual should be available.
3.Periodic testing / recovery and documentation are the most important part of backup policy.
4. Two important types of parities are:
i. vertical parity - single character
ii. horizontal parity - multiple character
Both parity together can not only detect but correct errors as well.
5. A duplicate information processing facility
i. is used as a recovery site
ii.can backup critical systems and application
iii.many times dedicated.
iv.helps in quick and efficient recovery in many situations
2. A good Backup and recovery System should have following features:
i. Backup should be properly labeled.
ii. Retention period should be clearly mentioned
iii. System log and application log should be separately stored
v. Periodic audit of the Backup & Recovery System should be there.
vi. Backup and Recovery Manual should be available.
3.Periodic testing / recovery and documentation are the most important part of backup policy.
4. Two important types of parities are:
i. vertical parity - single character
ii. horizontal parity - multiple character
Both parity together can not only detect but correct errors as well.
5. A duplicate information processing facility
i. is used as a recovery site
ii.can backup critical systems and application
iii.many times dedicated.
iv.helps in quick and efficient recovery in many situations
0 comments:
Post a Comment