The budget for IT is
increasing by 2% per annum causing the disaster recovery difficult option among
other needs in the business sector. Finding and retaining IT talents is also a
challenge since few people are involved in providing essential services that
guarantee privacy, confidentiality, and availability.
The companies have no
possibility of establishing their cloud because of lack of capital to develop a
cloud strategy (Spector, 2009). The solution to various IT issues includes
modernizing legacy applications and modernizing backup recovery and security
systems to adopt cloud backups.
Disasters on the rise
Disasters are mainly
divided into two natural disasters and man-made disasters. Businesses are
relying on technology. The technology is essential to businesses today in the
process of ensuring secure recovery of data and information. The major natural
disasters and weather extremes that pose high risks include floods, Hailstorms,
thunderstorms, high winds, and ice storms. In man-made disasters, human error
is the biggest cause of IT disasters (Sohal, 2013). The key causes of human errors
include IT incidences. Other IT-related disasters are caused by server
failures, power disruptions, fire floods or other natural disasters.
Traditional approaches
in disaster recovery
Cold site: the primary
location operates data and information backup infrequently on the cold site.
The cold site data recovery site may take time to reassemble applications that
can lead to accurate data and information recovery.
Frugal warm site:
maintaining a primary location is more expensive than maintaining recovery
location. The system is characterized by insufficient and depreciated resources
that cannot guarantee partial provision recovery of services. The problem with
the frugal warm site is that additional resources usually take more days to
arrive (Posey, 2008).
Local hot site: maintaining the primary location is expensive
as well as maintaining the recovery location. One catastrophic event can affect
both primary location and recovery location
A Hot site is extremely
expensive. It requires high capital as well as trained people to operate the
recovery center.
Helping others
understand risk is expensive
One of the methods used
to help others understand disaster include simulating the disaster. During the
simulation process, the various elements that are simulated include; Events
that refers to all types of disasters that can be experienced. The second element is the impact felt on
target application where the impact of the disaster can either be directly or
indirectly. The third is evaluating the downtime as the amount of time taken to
recover for example five days (Preston,
2007). The fourth is the asset that can be affected and final elements are the
challenge solution and its effectiveness. Examples of a Company that helps in
simulating disasters include F5 networks.
Cloud for effective
disaster recovery
The data center is
connected to recovery site or the storage location using private or VPN. The
data capacity stored is paid depending on the space requested as well as time
for use. The failure process during an event usually involves a business center
contacting or login in to back up the environment and access the entire data or
part of data that is desired. The cloud is important because it is cheap,
reliable and guarantees fault tolerance measures (Rajan, 2006). Based on
configurations set by the company data and information can be automatically
backed up on a daily basis. Continuing education as well as training employees
to practice disaster recovery operations.
References
Rajan
C. (2006) Oracle 10g Database Administrator II: Backup/recovery & Network Administration, Illustrated Edition,
Centage Learning, 2006; ISBN 1418836648, 9781418836641.
Preston W.C (2007) Backup &
Recovery: Inexpensive Backup Solutions for Open Systems, Revised Edition, "O'Reilly Media,
Inc.", 2007; ISBN 0596555040,
9780596555047.
Posey
B. (2008) Data backup types explained: Full, incremental, differential, and incremental forever backup.
Sohal,
G. (2013). Changing expectations for
backup and disaster
recovery: Computer
Fraud & Security, 2013(1), 16-18.
Doi: 10.1016/S1361-3723(13)70008-3.
Spector,
L. (2009). The Best Ways to
Back Up Your Data. PC World, 27(10),
89-95.
Carolyn Morgan is the author of this paper. A senior editor at MeldaResearch.Com in professional academic writing services. If you need a similar paper you can place your order from cheap reliable essay writing service.
No comments:
Post a Comment