Prudent Retaliation To Failure Case Study

Length: 3 pages Sources: 1+ Subject: Education - Computers Type: Case Study Paper: #94880632 Related Topics: Firewalls, Business Continuity, Cloud Computing, Architecture
Excerpt from Case Study :

¶ … Policy Creation

It is critical for organizations to develop and readily have available an incident response policy to address their various business and information technology needs. There are a couple of pivotal factors to account for in such a policy. These include various aspects of creating and maintaining an incident response team, business continuity planning, and a disaster recovery processes. Perhaps one of the most encouraging facets of engendering such a plan is that there are myriad developments within the IT space that can help to facilitate many of the components of these three aspects of this policy. Specifically, there are a number of options involving Cloud computing and data replication, as well as remote Software Oriented Architecture and services delivered through the cloud that can help to make such a policy effective if it ever requires implementation. The utilization of cloud computing and its many services, in addition to prudent data replication, should enable an incident response policy that propagates business continuity for Gem Infosys.

Perhaps the most vital part of this policy is the disaster recovery process that the utilization of certain cloud services can certainly assist with and, in many cases, actually ensure. There are a number of cloud services that provide the sort of infrastructure that can handily backup the physical infrastructure that Gem Infosys utilizes. That infrastructure involves only 10 PCs, a single firewall, a pair of web...

...

A software as a service offering such as Zetta DataProtect can singlehandedly "offer data backups and disaster recovery for a multitude of files, databases, and entire servers" (Harper, 2014), let alone for the rather modest IT infrastructure and its accordant data that Gem Infosys deploys. In this regard, one of the most salient aspects of this policy is to subscribe to Zetta DataProtect's service which enables organizations to continuously replicate data to the Cloud regardless of appliances. Thus, in the event that there is a firewall breach or some other attack on its physical infrastructure (including its servers), it will have a backup copy of its data in the cloud.

In terms of planning for business continuity, it is essential for Gem Infosys to subscribe to additional Cloud services. One of the most viable aspects of doing so is that such subscriptions and services can only be utilized in instances in which they are necessary -- such as during times of failure or even when conducting maintenance. Due to the cloud service model, companies only pay for services when they are used. Thus, the company should chooses to leverage additional platform as a service options and software oriented architecture that provides the same sort of software…

Sources Used in Documents:

References

Harper, J. (2014). Cloud data protection. www.dataversity.net Retrieved from http://www.dataversity.net/cloud-data-protection/

Harper, J. (2014). Data replication: the crux of data management. www.dataversity.net Retrieved from http://www.dataversity.net/data-replication-crux-data-management/


Cite this Document:

"Prudent Retaliation To Failure" (2015, August 22) Retrieved August 14, 2022, from
https://www.paperdue.com/essay/prudent-retaliation-to-failure-2152582

"Prudent Retaliation To Failure" 22 August 2015. Web.14 August. 2022. <
https://www.paperdue.com/essay/prudent-retaliation-to-failure-2152582>

"Prudent Retaliation To Failure", 22 August 2015, Accessed.14 August. 2022,
https://www.paperdue.com/essay/prudent-retaliation-to-failure-2152582

Related Documents
Ci Humint on the War Against Terrorism Gender Integration
Words: 11730 Length: 20 Pages Topic: Gender and Sexuality Paper #: 15580616

Gender Integration in CI/HUMINT and the War against Terrorism Gender Integration in CI/HUMINT on the War against Terrorism in the Middle East and Strategies for Effective Implementation Shea Larson Harry Nimon, Committee Chair Dr. Troy Mitchell, Subject Matter Expert Dr. Amanda Bowers, Committee Member The success of counterinsurgency operations depends on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Previously, the U.S. Armed Forces created opportunities

Oil Crisis of 1973: Its
Words: 9741 Length: 33 Pages Topic: Energy Paper #: 94184967

This was good for those that felt OPEC was getting too strong because these changes would have been very difficult to make had the embargo and the oil prices not become such an issue (Reid, 2004). Many countries begin to look for alternatives to the supplies that they were getting from Arab nations and in the years immediately following the embargo many efforts would be directed at the promotion of

Whistleblowing. It Explains and Analyzes the Term
Words: 2874 Length: 8 Pages Topic: Careers Paper #: 58581993

Whistleblowing." It explains and analyzes the term "whistleblowing" and takes a look at the various different issues related to it. Whistleblowing The term "Whistleblowing" is any revelation of information by an employee or candidate for employment which the employee or candidate rationally believes evidences one of the following: violation of law, rule, or regulation gross mismanagement gross waste of funds an abuse of authority substantial and specific danger to public health or