Wednesday, May 15, 2019

Disaster Recovery Workshop


The budget for IT is increasing by 2% per annum causing the disaster recovery difficult option among other needs in the business sector. Finding and retaining IT talents is also a challenge since few people are involved in providing essential services that guarantee privacy, confidentiality, and availability. 

The companies have no possibility of establishing their cloud because of lack of capital to develop a cloud strategy (Spector, 2009). The solution to various IT issues includes modernizing legacy applications and modernizing backup recovery and security systems to adopt cloud backups. 
Disasters on the rise
Disasters are mainly divided into two natural disasters and man-made disasters. Businesses are relying on technology. The technology is essential to businesses today in the process of ensuring secure recovery of data and information. The major natural disasters and weather extremes that pose high risks include floods, Hailstorms, thunderstorms, high winds, and ice storms. In man-made disasters, human error is the biggest cause of IT disasters (Sohal, 2013). The key causes of human errors include IT incidences. Other IT-related disasters are caused by server failures, power disruptions, fire floods or other natural disasters.   
Traditional approaches in disaster recovery
Cold site: the primary location operates data and information backup infrequently on the cold site. The cold site data recovery site may take time to reassemble applications that can lead to accurate data and information recovery.
Frugal warm site: maintaining a primary location is more expensive than maintaining recovery location. The system is characterized by insufficient and depreciated resources that cannot guarantee partial provision recovery of services. The problem with the frugal warm site is that additional resources usually take more days to arrive (Posey, 2008).
Local hot site:  maintaining the primary location is expensive as well as maintaining the recovery location. One catastrophic event can affect both primary location and recovery location
A Hot site is extremely expensive. It requires high capital as well as trained people to operate the recovery center.
Helping others understand risk is expensive
One of the methods used to help others understand disaster include simulating the disaster. During the simulation process, the various elements that are simulated include; Events that refers to all types of disasters that can be experienced.  The second element is the impact felt on target application where the impact of the disaster can either be directly or indirectly. The third is evaluating the downtime as the amount of time taken to recover for example five days  (Preston, 2007). The fourth is the asset that can be affected and final elements are the challenge solution and its effectiveness. Examples of a Company that helps in simulating disasters include F5 networks.
Cloud for effective disaster recovery
The data center is connected to recovery site or the storage location using private or VPN. The data capacity stored is paid depending on the space requested as well as time for use. The failure process during an event usually involves a business center contacting or login in to back up the environment and access the entire data or part of data that is desired. The cloud is important because it is cheap, reliable and guarantees fault tolerance measures (Rajan, 2006). Based on configurations set by the company data and information can be automatically backed up on a daily basis. Continuing education as well as training employees to practice disaster recovery operations.
  
References
Rajan C. (2006) Oracle 10g Database Administrator II: Backup/recovery & Network         Administration, Illustrated Edition, Centage Learning, 2006; ISBN 1418836648,           9781418836641.

 Preston W.C (2007) Backup & Recovery: Inexpensive Backup Solutions for Open Systems,        Revised Edition, "O'Reilly Media, Inc.", 2007; ISBN 0596555040, 9780596555047.

Posey B. (2008) Data backup types explained: Full, incremental, differential, and incremental       forever backup. 

Sohal, G. (2013). Changing expectations for backup and disaster recovery: Computer Fraud &     Security, 2013(1), 16-18. Doi: 10.1016/S1361-3723(13)70008-3.

Spector, L. (2009). The Best Ways to Back Up Your Data. PC World, 27(10), 89-95.


Carolyn Morgan is the author of this paper. A senior editor at MeldaResearch.Com in professional academic writing services. If you need a similar paper you can place your order from cheap reliable essay writing service.

No comments:

Post a Comment

Political Essay in Colorado

Are you looking to order for Political Essay?  When you order with us,we assign your political essay to writers who have experience and are...