Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Techniques for System and Data Recovery

Published

Author(s)

William E. Burr, Joan Hash

Abstract

The key asset in Federal agencies today is the information and data used to implement, sustain and maintain critical government programs and operations. Current efforts in ensuring that the United States can recover and restore activities which have great impact on the physical and economic health and safety of the American public are dependent upon the ability to quickly reinstate information systems and the data required to run those systems. Effective Homeland security is dependent upon an extensive amount of corroboration and data sharing. It is essential that those managing information technology (IT) security programs ensure that they have put contingencies in place for quick restoration of IT resources. A Business Impact Analysis should be completed. As part of this process, mission critical operations should be identified along with the supporting data and systems. Subsequent to identification of these critical assets, methods for recovery of data and systems due to error or attack must be included in the overall Business Continuity Plan. This ITL Bulletin focuses on techniques for addressing this important component of contingency planning. The intent is to provide users with a quick reference primer on methods for data and system recovery.
Citation
ITL Bulletin -

Keywords

authentication, backup, contingency, data availability, encryption, encryption keys, key recovery

Citation

Burr, W. and Hash, J. (2002), Techniques for System and Data Recovery, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=51024 (Accessed April 23, 2024)
Created April 1, 2002, Updated February 19, 2017