Friday, May 1, 2020

BCP and Disaster Recovery Plan †Free Samples to Students

Question: Discuss about the BCP and Disaster Recovery Plan. Answer: Introduction Security has been evolved for the long term to be in the standard terror that aims to have more than the cloud investments while the observations is been made on the improvements been made on the security. Checking to the public cloud security, the observations and ideas been made and are improving towards the security and stopping it form the malicious activities. Infrastructure as a Service (IaaS) usually aims to provide the virtualised computing resources over the internet connectivity. It mainly focus on delivering the infrastructure and outsourcing it to provide the security of the data which is been collected from the internet. Keeping the security terms in mind, the data is been violated and making the duplicated data and change the original data keeping all the issues and working on it the company deploying software is to keep the biggest concern about the privacy and the security regarding the issues. Because of all these concerns the organisation is not stopping it from mig ration of the database from 1 platform to another platform (Alhazmi Malaiya, 2013). When the database is been moved to the cloud device the security been shared during the risk with the responsibility which is been provided is to have an appropriate reason for it sometimes the expertise who are working in big industries allow them to increase the sensitivity of the data to the other party i.e. the third party which have the cloud providers to increases and make it difficult for the risk settings through which company keep on making the updating and perform the operations daily (Yang Jia, 2013). Once the database is been moved in to the IaaS instance in the cloud, the level of security is been increased into the cloud services. But for maintaining the security in the cloud the most important thing is to keep in the mind i.e. the budgeting of the security on the public cloud station which is totally different from the other platforms which generally have the other way of differentiating and preventing it from the risks. The most fundamental method which is being used from prevention is that the provider uses the shared responsibility models which mainly aim to spread the risks between the sellers and the potential buyers. Generally it happens that the customers generally dont buy the products and the equipments which are similar because sometimes the issue is been raised between the security in the cloud and the data canters (Xiao Xiao, 2013). Budgeting and taking the preventions in the security in the public cloud generally start from the applications that have the various infrastructure components that are existed, like serving of the documents, hosting a website, etc. In IaaS providers tend to allow the main responsibility which is to be provided to the customers. The benefits and issues that would be the result of your deployment of these security measures are- That is basically prevents from reducing the total infrastructure costs, it basically provides the group off virtual machines which are being hosting on the track. This basically helps the organisation in serving on a large scale of the servers, capacity of the storage, network connections, load balancing, etc. It tends to reduce the capital IT investments and the expenditures. The main benefits are: Maximising of the Resources with the Minimal Investments Increasability of the speed in the market Advantages to Drive competitive and its innovation Maximising Flexibility. Reduces various connectivity to the entry and reduce barriers for the large data centers (Wei, et al., 2014). The risks associated with migrating this mission critical database to the cloud The Database- Generally cloud environment generally faces the threats which are being placed as the corporate traditional corporate networks. This threat is mainly occur when the data is been violated from the one source to another source it generally happens because of the large amount of the data being stored in the networks on the cloud servers (Wei, et al., 2014). This tends to damage the sensitivity of the data which is been exposed. The IaaS infrastructure- It is essential to have a large storage i.e. should be cloud based storage service which requires the more demanding and usability of an application should be secured more so as to tolerate best hosted application services. The communications between Webbs and their IaaS database in the cloud- Insufficiency in the network based in the virtual networks and the tailoring with the accessibility to the web and to the IaaS database it generally have the limited accessibility to the networks infrastructure and IP based controls and network standards and it various zones are not applied usually (SILVA, 2016). Risks and the issues associated with the backing up of data on cloud computing: Confidentiality: The risk of unauthorised access to the data is called as the risk of confidentiality information is one of the vital assets of any organisation. And hence keeping the sensitive information confidential is critical for any organisation. As it is a general fact that clouds operates on the public networks it is more prone to cyber-crimes like data leakage, internet terrorism etc. When the data is moved on online platforms the hackers or the intruder seeks to decrypt the confidential data of the company so as to gain access to the companys confidential and sensitive data (Rong, Nguyen Jaatun, 2013). Integrity: The risk of integrity the risk of unauthorized alternations and modification of highly relevant information of the company. Data saved on the online platform can be safeguarded from the issues of data loss and damage through the use of tight data controls. However, even information saved on online mode i.e. the cloud is vulnerable to risks of data cracking, data hacking and other cyber-crime etc. the hackers of the information are discovering new techniques to have gain unauthorised access to the sensitive data of the company so that they can alter it by adding deleting or modifying the critical information of the company (Pearson, 2013). Standardisation risk: This risk occurs because the cloud system is not standardised. The cloud solutions are not all uniform as the vendors or the cloud service provider sets out different protocols to provide the services like backup and recovery plans of important data of company. Provider often has different opinion as to what is relevant and important when the issues of back-up and recovery provision arise (Rittinghouse Ransome, 2016). Connectivity: The proper working of internet network is the must for migrating the important data of the company to online modes and hence network issues imposes the risk of outage where the data can be stuck or get corrupted in between due to the improper network connectivity. Loss of data control: When the data is saved on premise platforms the business managers have full control over their important data but when the critical information is transferred to the public clouds the owners of the information may have to face the risk of loss of control over their own data (Khoshkholghi, 2014). Issues of data storage on cloud platforms Data privacy: The cloud platforms although are the cheap source of information safeguarding however due to the huge public network on the cloud system it is difficult for the cloud service providers to prevent the risk of hacking or cracking of data that is stored on the clouds. As cloud computing offers the cost effective and easily manageable infrastructure the users of cloud computing services are increasing day by day and due to the high access of cloud computing system by the users it is difficult for the cloud service vendors to control the risk of unauthorised access or data stealing (Kavis, 2014). Data recovery: Cloud services are often used by the businesses to get their critical data safeguarded from the risks and uncertainties of data corruption or data loss. Cloud computing enables the users to secure their data from those risks and uncertainties by providing the back-up services. However with the increased users of cloud services the cloud traffic is growing rapidly with each passing day therefore the cloud users have to face issues like slow data recovery or sometimes the data is recovered by the unauthorised persons without the actual users knowledge (Amiri, Cavusoglu Benbasat, 2014). Data backup: With the growing crowd over the cloud service platforms the cost of data back-up services are increasing affecting the cost effectiveness of the backing up features of cloud computing. To store the data as the backup plan the clouds are providing not the reliable storages as the data is highly vulnerable to the risk of unauthorised access (Hashem, et al., 2015). Retrieval of data from the cloud: Time consuming: Once the data is transferred to online modes it may sometimes get cumbersome for the users to take back their data in house as it may involve considerable time due to slow retrieval processes on cloud as a result of heavy users traffic. This process may make the users to wait for enormous time. Complex retrieval processes: The data retrieval sometimes gets complicated due to the involvement of technical issues in the data transfers and thus difficult for the business managers to cope up with the complexities of retrieval processes (Alhazmi Malaiya, 2013). The Webbs has started initialising to use the cloud backups and the DR plans so as to have the top priority of the backup recovery. DRP plans are very essential for the certain reasons which is been used in an organisation. It is essential to plan for the DRP system to continue all the business process in an organisation to simultaneously perform all the business activities which mainly deals with the goods and the services. The clouds initially offer the businesses to the virtual way of storing the large amount of data. It is essential to store all the files and the folders which is been kept at the data centers. Webbs protect access to these services that they are now moving to the Cloud The first thing to recognize the best suitable services that are being in the trend to use the best services for storing and migrating the best possible services for migrating the database to the cloud is so that the data should not be violated or been breached to the other platform and should not continue from preventing it the Webbs uses the (Fox, Patterson Joseph, 2013). Cloud backup and restore infrastructure This process is used to safeguard the business activities and to prevent from the disaster so as to protect the files which are been collected from the website or from the necessary applications needed. This process helps in to quickly access and perform the network operations and to rapidly increase in the restoring of the files when the system gets failed or the file is lost. The main benefits and the features of this software for which the Webbs uses It helps in saving time for easily creating, scheduling and managing of the file-level backups using the control panel. This software is less costly and save money. It helps in securing the organisational data This software is more reliable as comparison to other software It helps in easy way of accessing by the users for restoring the files from the Cloud control Panel. It helps in Customizing the scheduling which helps mainly in taking the backups very frequently. Provides the facility of the File based backups which help in restoring all the files and folders from the system (Almorsy, Grundy Mller, 2016). Conclusion Therefore it can be firmly concluded from the entire research that migration of data can cost severe consequences to the business if proper security measures are not used and implemented in data transferring from physical modes to online modes. In order to ensure the data security the businesses are thus required to critically analyse the potential risks involved in the data migration. Moreover, the business managers are required to make proper recovery plans of data before transferring it online. References Alhazmi, O. H., Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using the cloud. InReliability and Maintainability Symposium (RAMS), 2013 Proceedings-Annual(pp. 1-6). IEEE. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Amiri, A. K., Cavusoglu, H., Benbasat, I. (2014). When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing. Dutta, A., Peng, G. C. A., Choudhary, A. (2013). Risks in enterprise cloud computing: the perspective of IT experts.Journal of Computer Information Systems,53(4), 39-48. Fox, A., Patterson, D. A., Joseph, S. (2013).Engineering software as a service: an agile approach using cloud computing. Strawberry Canyon LLC. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Kavis, M. J. (2014).Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley Sons. Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., Othman, M. (2014). Disaster recovery in cloud computing: A survey.Computer and Information Science,7(4), 39. Pearson, S. (2013). Privacy, security and trust in cloud computing. InPrivacy and Security for Cloud Computing(pp. 3-42). Springer London. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Rong, C., Nguyen, S. T., Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), 47-54. SILVA, B. (2016). A framework for availability, performance and survivability evaluation of disaster tolerant cloud computing systems. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Xiao, Z., Xiao, Y. (2013). Security and privacy in cloud computing.IEEE Communications Surveys Tutorials,15(2), 843-859. Yang, K., Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing.IEEE transactions on parallel and distributed systems,24(9), 1717-1726.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.