Techniques for System and Data Recovery

Published: April 01, 2002


William E. Burr, Joan Hash


The key asset in Federal agencies today is the information and data used to implement, sustain and maintain critical government programs and operations. Current efforts in ensuring that the United States can recover and restore activities which have great impact on the physical and economic health and safety of the American public are dependent upon the ability to quickly reinstate information systems and the data required to run those systems. Effective Homeland security is dependent upon an extensive amount of corroboration and data sharing. It is essential that those managing information technology (IT) security programs ensure that they have put contingencies in place for quick restoration of IT resources. A Business Impact Analysis should be completed. As part of this process, mission critical operations should be identified along with the supporting data and systems. Subsequent to identification of these critical assets, methods for recovery of data and systems due to error or attack must be included in the overall Business Continuity Plan. This ITL Bulletin focuses on techniques for addressing this important component of contingency planning. The intent is to provide users with a quick reference primer on methods for data and system recovery.
Citation: ITL Bulletin -
NIST Pub Series: ITL Bulletin
Pub Type: NIST Pubs

Download Paper


authentication, backup, contingency, data availability, encryption, encryption keys, key recovery
Created April 01, 2002, Updated February 19, 2017