2.0 Operational System Incident Control
Copyright(c), 1996 - Management Analytics and Others - All Rights Reserved
2.1 Background on Operational Incidences
Major natural disasters including earthquakes, tornadoes, floods,
fires, etc. can create any of a number of ADP operational
incidences Incidences can also occur from intentional actions
such as bombs, terrorist and virus attacks, and also from
equipment failures such as power or cable problems. With such a
varied range of major and minor incidences to address, some
recovery strategies can be applied to all incidence types, while
other strategies must be incidence specific.
2.2 Determination of a Major Incidence
When a major incident occurs, the NRL Labwide Disaster Response
Plan details procedures for plan initiation and recovery. This
contingency plan is in accordance with OPNAVINST 5239.1A. The
NRL IS Security Group has no function under such conditions
except as identified herein. The IS Security Group is
responsible for identifying the location and capability of
equivalent processing resources when an incident causes the loss
of an individual IS system.
2.3 Recovering Essential Processing Resources (if applicable)
To recover from an event which could effect multiple IS
computing resources at NRL, the principal requirement will be to
recover the capability to perform equivalent processing
capability in the shortest possible time period after the
incident. The second requirement will be to recover with the
least economic burden. This recovery capability could take the
form of either stand-alone processing or network resources and
operations. Most incidences will not be large enough to require
full implementation of this incidence response plan.
2.3.1 Database of Redundant Systems
Recovery of applications and peripheral devices are the
responsibility of the ADP System Administrator. The IS Security
Office carries information concerning the processors, points of
contact, and the system's accreditation status.
In the event of denial of service for a specific system, the IS
Security Office can determine the existence of another similar
system at NRL.
The IS Security Office can develop a list of candidates at the
site that could potentially be used for backup support.