Saturday, October 23, 2010

case # 9

Disaster recovery Plan

Step 1: Risk Analysis
The first step in drafting a disaster recovery plan is conducting a thorough risk analysis of your computer systems. List all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common manmade threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most likely to occur and prioritize them using a simple system: rank each threat in two important categories, probability and impact. In each category, rate the risks as low, medium, or high.

Step 2: Establish the Budget
Once you've figured out your risks, ask 'what can we do to suppress them, and how much will it cost?' Can I detect a threat before it hits? How do I reduce the potential of it occurring? How do I minimize its impact to the business? For example, our small California Internet company could employ an emergency power supply to mitigate its power outage threat and have all its data backed up daily on RAID tapes, which are stored at a remote site in case of an earthquake. The more preventative measures you establish upfront the better. Emerson says, "dollars spent in prevention are worth more than dollars spent in recovery."

Step 3: Develop the Plan
The feedback from the business units will begin to shape your DRP procedures. If, for example, they determine that the company must be up within 48 hours of an incident to stay viable, then you can calculate the amount of time it would take to execute the recovery plan and have the business back up in that timeframe. Emerson suggests that you have the recovery systems tested, configured, and retested 24 hours prior to launching them. He says the set up takes anywhere from 40 hours to days to complete.

The recovery procedure should be written in a detailed plan or "script." Establish a Recovery Team from among the IT staff and assign specific recovery duties to each member. The manner in which your team conducts its recovery probably will be no different than its regular production procedures: the chain of command likely won't change and neither will the aspects of the network for which each member is responsible.

Define how to deal with the loss of various aspects of the network (databases, servers, bridges/routers, communications links, etc.) and specify who arranges for repairs or reconstruction and how the data recovery process occurs. The script will also outline priorities for the recovery: What needs to be recovered first? What is the communication procedure for the initial respondents? To complement the script, create a checklist or test procedure to verify that everything is back to normal once repairs and data recovery have taken place.

Step 4: Test, Test, Test
Once your DRP is set, test it frequently. Eventually you'll need to perform a component-level restoration of your largest databases to get a realistic assessment of your recovery procedure, but a periodic walk-through of the procedure with the Recovery Team will assure that everyone knows their roles. Test the systems you're going to use in recovery regularly to validate that all the pieces work. Always record your test results and update the DRP to address any shortcomings.

As your business environment changes, so should your DRP. Reexamine the plan every year on a high level: Do you still need every part of the plan? Do you need to add to it? Will the budget need to be adjusted to accommodate changes to the plan? As applications, hardware, and software are added to your network, they must be brought into the plan. New employees must be trained on recovery procedures. New threats to business seem to pop up every week and a sound DRP takes all of them into account.

case #8

Current issue in the Philippines
Today's Economy
The Philippine economy seems comparatively well-equipped to weather the global financial crisis in the short term, partly as a result of the efforts over the past few years to control the fiscal deficit, bring down debt ratios, and adopt internationally-accepted banking sector capital adequacy standards. The Philippine banking sector--which comprises 80% of total financial system resources--has limited direct exposure to distressed financial institutions overseas (i.e., $2 billion, less than 2% of aggregate banking system assets). Conservative regulatory policies, including the prohibition of investments in structured products, shielded the insurance sector from exposure to distressed financial firms. While direct financial exposure to problematic investments and financial institutions is limited, the impact of external shocks to economic growth, poverty alleviation, employment, remittances, credit availability, and overall investment prospects is a concern.

GDP grew by 7.3% in 2007, the fastest annual pace of growth in over three decades--fueled by increased government and private construction expenditures; a robust information communications technology industry; improved post-drought agricultural harvests; and strong private consumption, spurred in part by $14.4 billion in remittances from overseas workers (equivalent to about 10% of GDP). However, real year-on-year GDP growth slowed to 3.8% during 2008, reflecting the impact of high food and fuel prices and global financial uncertainties on the domestic economy. Overseas workers’ remittances--which increased 13.7% year-on-year in 2008 to a new $16.4 billion record--helped cushion the impact of external shocks on economic growth, but began to slow during 2008’s fourth quarter. Remittances are expected to grow 3%-4% in 2009 despite the global financial crisis, helping the economy avoid recession and supporting the balance of payments and international reserves. Most independent forecasts also currently see Philippine GDP growing within the government’s 0.8%-1.8% targeted range for 2009. It will take a higher, sustained economic growth path to make more appreciable progress in poverty alleviation given the Philippines' annual population growth rate of 2.04%, one of the highest in Asia. The portion of the population living below the national poverty line increased from 30% to 33% between 2003 and 2006, equivalent to an additional 3.8 million poor Filipinos. Slower economic growth here and abroad, a soft domestic labor market, and uncertainties over overseas employment opportunities threaten to push more Filipinos into poverty.

Business process outsourcing (BPO) has been the fastest-growing segment of the Philippine economy and has been relatively resilient amid the global financial turmoil, totaling an estimated 10% of the global outsourcing market and generating more than $6 billion in revenues in 2008 (up 26% and equivalent to about 3.6% of Philippine GDP). Although revenue growth has slowed from 40% during 2006 and 2007, industry officials expect the BPO sector to post double-digit revenue growth of between 20%-30%, and to generate about 100,000 new jobs, during 2009. The balance of payments surplus--which hit a record $8.6 billion in 2007 from higher overseas worker remittances, tourism receipts, BPO-related revenues, portfolio investments, and official development assistance funds--narrowed to $18 million during 2008. Merchandise exports--which rely heavily on electronics shipments for about two-thirds of sales--declined by nearly 3% year-on-year during 2008, pulled down by a 23% year-on-year decline in fourth-quarter revenues. Although there has been some improvement over the years, the local value added of electronics exports remains relatively low at about 30%. Net foreign direct investment (FDI) inflows dropped by 48% from 2007, to $1.5 billion; and net foreign portfolio capital reversed from a $3.8 billion net inflow in 2007 to a $3.6 billion net outflow in 2008. Import growth slowed but nevertheless increased by more than 2%, mainly because of spikes in international prices of fuel, rice, and petroleum-based agricultural inputs. Foreign tourist arrivals sputtered to 1.5% growth and tourism-related revenues weakened. The United States remains the Philippines' largest trading partner with $17 billion in two-way trade during 2008, and is among the largest investors with $6 billion in total direct investments. Although showing signs of bottoming out, merchandise exports slumped further in 2009 (with January-August 2009 exports down 30.3% year-on-year). However, the merchandise import bill has also declined (31.2% as of August 2009), combining with the continued expansion in overseas remittances and BPO revenues, and improving net foreign direct and portfolio investment flows to produce a wider balance of payments surplus (estimated at $2.8 billion as of August 2009).

The Philippine stock market index--which closed 2008 down more than 48% year-on-year--closed mid-October 2009 more than 57% higher from end-2008. The Philippine peso, which closed 2008 15% weaker from end-2007, has appreciated by 2.5% since the beginning of the year. Gross international reserves ($37.6 billion as of end-2008) have risen further to a new record high of nearly $42.3 billion as of end-September 2009, adequate for close to 8 months of goods and services imports and equivalent to 3.6 times foreign debts maturing over the next 12 months.

Efforts in recent years to reduce the fiscal deficit by raising new taxes have helped reduce high debt ratios, create additional fiscal space to increase spending on vital social services and infrastructure after years of tight budgets, and improve confidence. December 2004 legislation provided for biennial adjustments to the excise tax rates for tobacco and liquor products until 2011; the government began implementing an amended value added tax (VAT) law in November 2005 that expanded VAT coverage and increased the VAT rate from 10% to 12%; and a law signed in January 2005 seeks to institute a performance-based rewards system in the government's revenue collection agencies. Although still high by regional and emerging country standards, the debt of the national government has declined to about 56% of GDP; and that of the consolidated public sector to about 64% of GDP. Major credit rating agencies raised their rating outlook from “negative” to “stable” in recognition of fiscal progress and more manageable debt ratios.

The national government worked to reduce its fiscal deficits for five consecutive years to 0.2% of GDP in 2007 and had hoped to balance the budget in 2008. The Arroyo administration no longer targets leaving office in 2010 with a balanced budget, opting instead for measured deficit spending to help stimulate the economy and temper the adverse impact of global external shocks on the already high number of Filipinos struggling with poverty. The national government ended 2008 with a deficit equivalent to 0.9% of GDP and has programmed a higher deficit for 2009 equivalent to 3.2% of GDP. Looking forward, further reforms are needed to ease fiscal pressures from large losses being sustained by a number of government-owned firms and to control and manage contingent liabilities. Despite recent improvements, challenges remain to the long-term viability of state-run pension funds. The national government's tax-to-GDP ratio increased from 13% in 2005 to 14.3% in 2006 after new tax measures went into effect; however, it declined and stagnated at 14% in 2007 and 2008, has declined further in 2009 (to 13.5% during the first semester), and remains low relative to historical performance (i.e., 1997’s 17% peak ratio) and vis-à-vis regional standards. The government has intermittently relied on heftier privatization receipts to make up for the shortfall in targeted tax collections but this is not a sustainable revenue source. Legislation passed in 2008 providing tax relief for minimum wage earners and individual taxpayers, a cut in the corporate income tax rate from 35% to 30% starting 2009, and no further adjustments to liquor and tobacco excise taxes after 2011 will erode government revenues further.

The Philippine Congress enacted an anti-money laundering law in September 2001 and followed through with amendments in March 2003 to address legal concerns posed by the Organization for Economic Cooperation and Development (OECD) Financial Action Task Force (FATF). The FATF removed the Philippines from its list of Non-Cooperating Countries and Territories in February 2005, noting the significant progress made to remedy concerns and deficiencies identified by the FATF to improve implementation. The Egmont Group, the international network of financial intelligence units, admitted the Philippines to its membership in June 2005. The FATF Asia Pacific Group conducted a comprehensive peer review of the Philippines in September 2008. Some of the more important concerns include the exclusion of casinos from the list of covered institutions and 2008 court rulings that inhibit and complicate investigations of fraud and corruption by prohibiting ex-parte inquiries regarding suspicious accounts. The Philippines’ financial intelligence unit is pushing for amendments to the anti-money laundering law to address these concerns.

Eight years after the Arroyo administration enacted legislation to rationalize the electric power sector and privatize the government's debt-saddled National Power Corporation (NPC), significant progress was made only in 2007, with the privatization of the state-owned transmission company (Transco) and sales of 68% of total generating assets in Luzon and the Visayas. The Arroyo government is confident it will complete its privatization targets in 2009.

The U.S. Trade Representative removed the Philippines from its Special 301 Priority Watch List in 2006, reflecting improvement in its enforcement of intellectual property rights (IPR) protection. It has maintained the Philippines on the Special 301 Watch List through 2009. However, sustained effort and continuing progress on key IPR issues will be essential to maintain this status.

Despite a number of policy reforms, the Philippines continues to face important challenges and must sustain the reform momentum to achieve and sustain the strong post-crisis recovery needed to spur investments, achieve higher growth, generate employment, and alleviate poverty for a rapidly expanding population. Absent new revenue measures, sustained fiscal stability will require more aggressive tax collection efficiency to address the severe under-spending in infrastructure and social services after years of tight budgets. Continuing efforts to fast-track power sector privatization remain critical to the long-term stability of public sector finances, ensuring reliable electricity supply, and bringing down the cost of power. Climate change is an emerging threat to agriculture and overall growth, and also could further complicate fiscal consolidation efforts.

Potential foreign investors, as well as tourists, remain concerned about law and order, inadequate infrastructure, policy and regulatory instability, and governance issues. While trade liberalization presents significant opportunities, intensifying global competition and the emergence of low-wage export economies also pose challenges. Competition from other Southeast Asian countries and from China for investment underlines the need for sustained progress on structural reforms to remove bottlenecks to growth, to lower costs of doing business, and to promote good public and private sector governance. The government has been working to reinvigorate its anti-corruption drive, and the Office of the Ombudsman has reported improved conviction rates. Nevertheless, the Philippines’ efforts are lagging and more needs to be done to improve international perception of its anti-corruption campaign--an effort that will require strong political will and significantly greater financial and human resources.

Agriculture and Forestry
Arable farmland comprises more than 40% of the total land area. Although the Philippines is rich in agricultural potential, inadequate infrastructure, lack of financing, and government policies have limited productivity gains. Philippine farms produce food crops for domestic consumption and cash crops for export. The agricultural sector employs more than one-third of the work force but provides less than a fifth of GDP.

Decades of uncontrolled logging and slash-and-burn agriculture in marginal upland areas have stripped forests, with critical implications for the ecological balance. Although the government has instituted conservation programs, deforestation remains a severe problem.

With its 7,107 islands, the Philippines has a very diverse range of fishing areas. Notwithstanding good prospects for marine fisheries, the industry continues to face a difficult future due to destructive fishing methods, a lack of funds, and inadequate government support.

Agriculture generally suffers from low productivity, low economies of scale, and inadequate infrastructure support. Despite the adverse effects of successive strong typhoons in the last four months of 2006, the overall agricultural output expanded by 3.8% during that year. In 2007, the sector grew by 4.7%, led by gains in the fisheries subsector. The sector registered slower growth in 2008 at 3.9%, due mainly to negative growth in the livestock sector and lesser output in the crops and fisheries subsector, and growth is expected to slow further to under 2% in 2009 due to adverse weather conditions.

Industry
Industrial production is centered on the processing and assembly operations of the following: food, beverages, tobacco, rubber products, textiles, clothing and footwear, pharmaceuticals, paints, wood and wood products, paper and paper products, printing and publishing, furniture and fixtures, small appliances, and electronics. Heavier industries are dominated by the production of cement, glass, industrial chemicals, fertilizers, iron and steel, mineral products, and refined petroleum products. Newer industries, particularly production of semiconductors and other intermediate goods for incorporation into consumer electronics are important components of Philippine exports and are located in special export processing zones.

The industrial sector is concentrated in urban areas, especially in the metropolitan Manila region, and has only weak linkages to the rural economy. Inadequate infrastructure, transportation, and communication have so far inhibited faster industrial growth, although significant strides have been made in addressing the last of these elements.

Mining
The Philippines is one of the world's most highly mineralized countries, with untapped mineral wealth estimated at more than $840 billion. Philippine copper, gold, and chromate deposits are among the largest in the world. Other important minerals include nickel, silver, coal, gypsum, and sulfur. The Philippines also has significant deposits of clay, limestone, marble, silica, and phosphate. The discovery of natural gas reserves off Palawan has been brought on-line to generate electricity.

Despite its rich mineral deposits, the Philippine mining industry is just a fraction of what it was in the 1970s and 1980s when the country ranked among the ten leading gold and copper producers worldwide. Low metal prices, high production costs, and lack of investment in infrastructure have contributed to the industry's overall decline. A December 2004 Supreme Court decision upheld the constitutionality of the 1995 Mining Act, thereby allowing up to 100% foreign-owned companies to invest in large-scale exploration, development, and utilization of minerals, oil, and gas.

Saturday, September 18, 2010

case # 7

WAYS TO SECURE COMPUTER SYSTEM FROM BEING COMPROMISED


  • Consult your system support personnel if you work from home
  • If you use your broadband access to connect to your employer's network via a Virtual Private Network (VPN) or other means, your employer may have policies or procedures relating to the security of your home network. Be sure to consult with your employer's support personnel, as appropriate, before following any of the steps outlined in this document.

  • Don't open unknown email attachments
  • Before opening any email attachments, be sure you know the source of the attachment. It is not enough that the mail originated from an address you recognize. The Melissa virus spread precisely because it originated from a familiar address. Malicious code might be distributed in amusing or enticing programs.

    If you must open an attachment before you can verify the source, we suggest the following procedure:

    1. be sure your virus definitions are up-to-date (see "Use virus protection software" above)
    2. save the file to your hard disk
    3. scan the file using your antivirus software
    4. open the file

    For additional protection, you can disconnect your computer's network connection before opening the file.

    Following these steps will reduce, but not wholly eliminate, the chance that any malicious code contained in the attachment might spread from your computer to others.

  • Don't run programs of unknown origin
  • Never run a program unless you know it to be authored by a person or company that you trust. Also, don't send programs of unknown origin to your friends or coworkers simply because they are amusing -- they might contain a Trojan horse program.

  • Disable hidden filename extensions
  • Windows operating systems contain an option to "Hide file extensions for known file types". The option is enabled by default, but you can disable this option in order to have file extensions displayed by Windows. After disabling this option, there are still some file extensions that, by default, will continue to remain hidden.

    There is a registry value which, if set, will cause Windows to hide certain file extensions regardless of user configuration choices elsewhere in the operating system. The "NeverShowExt" registry value is used to hide the extensions for basic Windows file types. For example, the ".LNK" extension associated with Windows shortcuts remains hidden even after a user has turned off the option to hide extensions.

    Specific instructions for disabling hidden file name extensions are given in

  • Keep all applications, including your operating system, patched
  • Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information.

    Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered you may need to check periodically for updates.

  • Turn off your computer or disconnect from the network when not in use
  • Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network.

  • Disable Java, JavaScript, and ActiveX if possible
  • Be aware of the risks involved in the use of "mobile code" such as ActiveX, Java, and JavaScript. A malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser.

    The most significant impact of this vulnerability can be avoided by disabling all scripting languages. Turning off these options will keep you from being vulnerable to malicious scripts. However, it will limit the interaction you can have with some web sites.

    Many legitimate sites use scripts running within the browser to add useful features. Disabling scripting may degrade the functionality of these sites.

    More information on ActiveX security, including recommendations for users who administer their own computers, is available in

    More information regarding the risks posed by malicious code in web links can be found in

  • Disable scripting features in email programs
  • Because many email programs use the same code as web browsers to display HTML, vulnerabilities that affect ActiveX, Java, and JavaScript are often applicable to email as well as web pages. Therefore, in addition to disabling scripting features in web browsers (see "Disable Java, JavaScript, and ActiveX if possible", above), we recommend that users also disable these features in their email programs.

  • Make regular backups of critical data
  • Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks somewhere away from the computer.

  • Make a boot disk in case your computer is damaged or compromised
  • To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this disk before you have a security event.

    case # 6

    CONSUMER ACT OF THE PHILIPPINES


    ☺MY REACTION☺

    This act helps consumer regarding against business policy,helps to have privacy. This act helps to caught those who are not abiding the law regarding in the business cause as said the one who prevails to abide the law could be penalized.

    case # 5

    HOW NEW TECHNOLOGY REWIRING OUR BRAINS?


    Yου rесkοn your car radio іѕ broken bесаυѕе it doesn't display the name of the song аnd the artist. Yου tap a word οn a paperback аnd wonder why the definition doesn't automatically pop up. Yου smack a digit асrοѕѕ the cover of your cell phone аnd all уου get are fingerprint smudges.

    then уου remember: Thаt isn't a satellite radio. Yου're reading аn actual book, nοt a Kindle. It's nοt a smart phone, іt's a dumb one. Yου were expecting the сοοl capabilities of nеw technology–frοm ancient technology.

    “It used to be wе wanted to keep up with the Joneses,” ѕауѕ Christine Louise Hohlbaum, author of Thе Power of slow: 101 Ways to Save Time in our 24/7 World. “Now all wе want іѕ to keep up with our gadgets. Technology pervades еνеrу position of our lives. our touchscreen existence has literally rewired our brains. our behavior іѕ аlѕο informed by the technology wе υѕе. Wе tap, ping, аnd Skype [download], all day long.”

    Sο sometimes wе get a little flummoxed whеn confronted by something thаt isn't digital–lіkе a door thаt really requires a key, or a book whose pages don't turn by themselves, or a TV thаt plays shows in real time with nο skipping past the commercials.

    Iѕ thіѕ a common problem, or are wе just spoiled geeks? Wе asked around. Turns out wе're nοt the only ones who regularly have out-οf-technology experiences. Here are some typical ones.

    case # 5

    Friday, August 13, 2010

    case #4 IT Outsourcing

    What is IT outsourcing?

    ☻☻Information Technology Outsourcing
    or ITO is a company's outsourcing of computer or Internet related work, such as programming, to other companies. It is used in reference to Business Process Outsourcing or BPO, which is the outsourcing of the work that does not require much of technical skills.


    ☻☻Advantage☻☻
    The benefits of outsourcing are:

    Less capital expenditure - For example, by outsourcing information technology requirements, a company does not have to buy expensive hardware and software.

    Less management headache - For example, by outsourcing business process such as accounting, a company no longer has to hire and manage accounting personnel.

    Focus on core competencies - Outsourcing non-core related processes will allow a business to focus more on it's core competencies and strengths, giving it a competitive advantage.


    ☻☻Disadvantage☻☻

    Before deciding on outsourcing your company's business process, keep in mind the disadvantages of outsourcing:

    Less managerial control - It may be harder to manage the outsourcing service provider as compared to managing your own employees.

    Outsourcing company goes out of business - If your outsourcing service provide goes bankrupt or out of business, your company will have to quickly transition to a new service provider or take the process back in-house.

    May be more expensive - Sometimes it is cheaper to keep a process in-house as compared to outsourcing.

    Security and confidentiality issues - If your company is outsourcing business processes such as payroll, confidential information such as salary will be known to the outsourcing service provider.

    ☻☻Implication☻☻

    The jobs in India created due to outsourcing are mainly back office and research and development jobs such as Call centers, transaction processing, Chip design, Software development services, financial research, medical transcription, IT consulting, product design, tax processing and the like. These outsourcing jobs are mainly seen in the financial, insurance, technical, software and banking sectors.