KHO THƯ VIỆN 🔎

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

➤  Gửi thông báo lỗi    ⚠️ Báo cáo tài liệu vi phạm

Loại tài liệu:     PDF
Số trang:         230 Trang
Tài liệu:           ✅  ĐÃ ĐƯỢC PHÊ DUYỆT
 











Nội dung chi tiết: Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

111inBusiness ContinuityIn This SectionChapter 11: Introduction to Business ContinuityChapter 12: Backup and RecoveryChapter 13: Local ReplicationChap

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 pter 14: Remote Replicationchapter 11 Introduction to Business ContinuityContinuous access to information is a must for the smooth functioning of busi

ness operations today, as the cost of business disruption could be catastrophic. There are many threats to information availability, such as natural d Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

isasters (e.g., flood, fire, earthquake), unplanned occurrences (e.g., cybercrime, human error, network and computer failure), and planned occurrences

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

(e.g., upgrades, backup, restore) that result in the inaccessibility of information. It is critical for businesses to define appropriate plans that c

111inBusiness ContinuityIn This SectionChapter 11: Introduction to Business ContinuityChapter 12: Backup and RecoveryChapter 13: Local ReplicationChap

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 crises. Business continuity is an important process to define and implement these plans.Business continuity (BC) is an integrated and enterprisewide p

rocess that includes all activities (internal and external to IT) that a business must perform to mitigate the impact of planned and unplanned downtim Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

e. BC entails preparing for, responding to, and recovering from a system outage that adversely affects business operations. It involves proactive meas

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

ures, such as business impact analysis and risk assessments, data protection, and security, and reactive countermeasures, such as disaster recovery an

111inBusiness ContinuityIn This SectionChapter 11: Introduction to Business ContinuityChapter 12: Backup and RecoveryChapter 13: Local ReplicationChap

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 conduct vital business operations.229230 Section III ■ Business ContinuityThis chapter describes the factors that affect information availability. It

also explains how to create an effective BC plan and design fault-tolerant mechanisms to protect against single points of failure.11.1 Information Av Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

ailabilityInformation availability (ỈA) refers to the ability of the infrastructure to function according to business expectations during its specifie

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

d time of operation. Information availability ensures that people (employees, customers, suppliers, and partners) can access information whenever they

111inBusiness ContinuityIn This SectionChapter 11: Introduction to Business ContinuityChapter 12: Backup and RecoveryChapter 13: Local ReplicationChap

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 ability to function without failure, under stated conditions, for a specified amount of time.■Accessibility: This is the state within which the requi

red information is accessible at the right place, to the right user. The period of time during which the system is in an accessible state is termed sy Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

stem uptime; when it is not accessible it is termed system downtime.■Timeliness: Defines the exact moment or the time window (a particular time of the

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

day, week, month, and/or year as specified) during which information must be accessible. For example, if online access to an application is required

111inBusiness ContinuityIn This SectionChapter 11: Introduction to Business ContinuityChapter 12: Backup and RecoveryChapter 13: Local ReplicationChap

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 uses of Information UnavailabilityVarious planned and unplanned incidents result in data unavailability. Planned outages include installation/integrat

ion/maintenance of new hardware, software upgrades or patches, taking backups, application and data restores, facility operations (renovation and cons Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

truction), and refresh/migration of the testing to the production environment. Unplanned outages include failure caused by database corruption, compon

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

ent failure, and human errors.Another type of incident that may cause data unavailability is natural or man-made disasters such as flood, fire, earthq

111inBusiness ContinuityIn This SectionChapter 11: Introduction to Business ContinuityChapter 12: Backup and RecoveryChapter 13: Local ReplicationChap

Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 se data to be unavailable. Statistically, less than 1 percent is likely to be the result of an unforeseen disaster.chapter 11 ■ Introduction to Busi—t

-0,8DisasterPlanned OutageUnplanned Outage Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2

111inBusiness ContinuityIn This SectionChapter 11: Introduction to Business ContinuityChapter 12: Backup and RecoveryChapter 13: Local ReplicationChap

Gọi ngay
Chat zalo
Facebook