Skip main navigation

£199.99 £139.99 for one year of Unlimited learning. Offer ends on 28 February 2023 at 23:59 (UTC). T&Cs apply

Find out more

Damage Control and Assessment: Setting up Your Plan

This video will help you set up your own damage control plan for if your network is breached.
So general needs. Data backups are going to be crucial. You should have offsite backups, incremental backups, and full backups. And we’re going to go more into this later. You want to have fire suppression units. Your critical data storage and server room should be fitted with fire suppression because they’re not going to harm the hardware and hopefully you either. So example, having a old fashioned water sprinkler system in a server room. Well, you’re probably going to kill your servers. Your servers are probably going to short out, probably going to wreck all your servers, possibly destroy your data with that. Generally for server rooms, you have some sort of halon unit, preferably with a emergency switch if someone’s stuck in there.
So again, you want to make sure that you have a fire suppression unit that is capable of taking care of the fire, yet preserving your hardware, and also have some sort of redundant safety that if a person’s in there, that that does not harm the individual in there, that they’re able to get out of the server room, close the door, and then the suppression unit wipes out the fire. You want to have a list of emergency contact numbers and email addresses and whatnot. So you want your ISP management, fire department, police department numbers, et cetera. Battery backups. Battery backups can be critical for your infrastructure.
So your core switches in your servers, your data backup units, should have battery backup units attached to them. Because having a hard shutdown could possibly corrupt your data. I’ve seen hard shutdowns, power outages, brownouts, corrupt data, destroy hard drives, wipe out power supplies, and even just fry entire servers before. So it does happen. Having a battery backup when the power goes out, your servers don’t shut off immediately. They’ll stay online for whatever your batteries rated. Hopefully enough time for the power to kick back on or for you to get over there to gracefully shut down the servers and whatnot. Now, you also want a chain of command list again.
So again, if something goes wrong, you need to know who to contact in an emergency. Likewise, you’ll need to know who you need to report to with said emergency. And practise. You want to make sure that you practise your plans to help vet them out and make sure they work properly. Likewise, your backup should be tested periodically. And you want to ensure that your data backups work and you’re able to recover them quickly. Again, practicing will also help us determine what’s working, what’s not working. And then eventually, when a disaster happens, everyone knows the routine. They’re not guessing. They’re not jumping to find the book to find out, well, hold on, I think my part’s on page 18 or whatever.
Practicing the plan will help build that muscle memory to get in there and get things done quickly, efficiently. And, again, we can kind of hammer out the bugs with what works, what doesn’t work, hopefully before real disaster hits.
So in the next video, we’re going to be talking about backup recovery. Thank you for watching. I’ll see you in the next video.

This video will help you set up your own damage control plan for if your network is breached.

As discussed in the previous video, you need to plan for the possibility that a hacker may still breach your network despite your security strategy or that something else could happen to result in a loss of data. You will start learning how to set up your own recovery plan, starting with what you need to consider in terms of your specific risks and needs.

Reflect and share: In terms of your own network (and all the devices that use the network) what do you think are the top risks to your data that need to be considered for your own backup plan? Share your comments in the section below.

This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education