Knowledge

IT disaster recovery

Source πŸ“

517: 170: 288:
RPO is tied to the times backups are secured offsite. Sending synchronous copies to an offsite mirror allows for most unforeseen events. The use of physical transportation for tapes (or other transportable media) is common. Recovery can be activated at a predetermined site. Shared offsite space and
71:
supporting critical business functions. This involves keeping all essential aspects of a business functioning despite significant disruptive events; it can therefore be considered a subset of business continuity (BC). DR assumes that the primary site is not immediately recoverable and restores data
137:, titled BS25777, specifically to align computer continuity with business continuity. This was withdrawn following the publication in March 2011 of ISO/IEC 27031, "Security techniques β€” Guidelines for information and communication technology readiness for business continuity." 235:
RPO measures the maximum time in which recent data might have been permanently lost and not a direct measure of loss quantity. For instance, if the BC plan is to restore up to the last available backup, then the RPO is the interval between such backups.
239:
RPO is not determined by the existing backup regime. Instead BIA determines RPO for each service. When off-site data is required, the period during which data might be lost may start when backups are prepared, not when the backups are secured off-site.
125:
Planning includes arranging for backup sites, whether they are "hot" (operating prior to a disaster), "warm" (ready to begin operating), or "cold" (requires substantial work to begin operating), and standby sites with hardware as needed for continuity.
276:
A data synchronization point is a backup is completed. It halts update processing while a disk-to-disk copy is completed. The backup copy reflects the earlier version of the copy operation; not when the data is copied to tape or transmitted elsewhere.
424:
Control measures can be classified as controls aimed at preventing an event from occurring, controls aimed at detecting or discovering unwanted events, and controls aimed at correcting or restoring the system after a disaster or an event.
347:
since 2010 created new opportunities for system resiliency. Service providers absorbed the responsibility for maintaining high service levels, including availability and reliability. They offered highly resilient network designs.
412:
have become increasingly critical to the smooth operation of a company, and arguably the economy as a whole, the importance of ensuring the continued operation of those systems, and their rapid recovery, has increased.
300:
Planning for disaster recovery and information technology (IT) developed in the mid to late 1970s as computer center managers began to recognize the dependence of their organizations on their computer systems.
371:
Technological hazards include accidents or the failures of systems and structures such as pipeline explosions, transportation accidents, utility disruptions, dam failures, and accidental hazardous material
340:
IT service continuity became essential as part of Business Continuity Management (BCM) and Information Security Management (ICM) as specified in ISO/IEC 27001 and ISO 22301 respectively.
527:(DRaaS) is an arrangement with a third party vendor to perform some or all DR functions for scenarios such as power outages, equipment failures, cyber attacks, and natural disasters. 440:
highlights which disaster recovery measures are appropriate. Different strategies make sense based on the cost of downtime compared to the cost of implementing a particular strategy.
375:
Human-caused threats that include intentional acts such as active assailant attacks, chemical or biological attacks, cyber attacks against data or infrastructure, sabotage, and war.
649: 470:
high availability systems which keep both the data and system replicated off-site, enabling continuous access to systems and data, even after a disaster (often associated with
315:
The disaster recovery industry developed to provide backup computer centers. Sungard Availability Services was one of the earliest such centers, located in Sri Lanka (1978).
1127:"Threat and Hazard Identification and Risk Assessment (THIRA) and Stakeholder Preparedness Review (SPR): Guide Comprehensive Preparedness Guide (CPG) 201, 3rd Edition" 1049: 387:
Research supports the idea that implementing a more holistic pre-disaster planning approach is more cost-effective. Every $ 1 spent on hazard mitigation (such as a
741: 379:
Preparedness measures for all categories and types of disasters fall into the five mission areas of prevention, protection, mitigation, response, and recovery.
820: 467:
hybrid cloud solutions that replicate both on-site and to off-site data centers. This provides instant fail-over to on-site hardware or to cloud data centers.
917: 436:
The disaster recovery strategy derives from the business continuity plan. Metrics for business processes are then mapped to systems and infrastructure. A
187:
performance are measured by RTO and RPO in terms of time lost from normal business process functioning and data lost or not backed up during that period.
1209:"Use of the Professional Practices framework to develop, implement, maintain a business continuity program can reduce the likelihood of significant gaps" 421:
Control measures are steps or mechanisms that can reduce or eliminate threats. The choice of mechanisms is reflected in a disaster recovery plan (DRP).
840: 1126: 892: 174:
Example showing longer 'actual' times that do NOT meet either RPO or RTOs ('objectives'). Diagram provides schematic representation of the terms
776: 1073: 1413: 232:
A recovery that is not instantaneous restores transactional data over some interval without incurring significant risks or losses.
17: 1095: 1477:"Glossary of terms for Business Continuity, Disaster Recovery and related data mirroring & z/OS storage technology solutions" 460:
private cloud solutions that replicate metadata (VMs, templates and disks) into the private cloud. Metadata are configured as an
1276: 1454:"ISO/IEC 27001:2013(en) Information technology β€” Security techniques β€” Information security management systems β€” Requirements" 201:
The business continuity group conducts timed rehearsals (or actuals), during which RTA gets determined and refined as needed.
1251: 1237: 1111: 1026: 1476: 1462:"ISO/IEC 27002:2013(en) Information technology β€” Security techniques β€” Code of practice for information security controls" 725: 582: 318:
During the 1980s and 90s, computing grew exponentially, including internal corporate timesharing, online data entry and
983: 329:
Regulatory agencies became involved; availability objectives of 2, 3, 4 or 5 nines (99.999%) were often mandated, and
1357: 1330: 1303: 949: 752: 623: 921: 1010: 592: 524: 285:
RTO and the RPO must be balanced, taking business risk into account, along with other system design criteria.
166:(BIA) by the owner(s) of the process, including identifying time frames for alternate or manual workarounds. 130: 657: 1555: 1165: 547: 492: 31: 368:
Natural hazards include acts of nature such as floods, hurricanes, tornadoes, earthquakes, and epidemics.
1565: 1545: 557: 257: 253: 221: 1144:"Post-Disaster Recovery Planning Forum: How-To Guide, Prepared by Partnership for Disaster Resilience" 1446:"ISO 22301:2019(en), Security and resilience β€” Business continuity management systems β€” Requirements" 1560: 175: 163: 867: 353: 701: 220:
For example, if RPO is measured in minutes, then in practice, off-site mirrored backups must be
1461: 1453: 562: 388: 308:. An offsite mainframe could be loaded from backup tapes pending recovery of the primary site; 292:
For high volumes of high-value transaction data, hardware can be split across multiple sites.
1437: 971: 597: 511: 437: 349: 184: 453:
replication off-site, such that once the systems are restored or synchronized, possibly via
1445: 602: 572: 454: 35: 679: 488:
surge protectors β€” to minimize the effect of power surges on delicate electronic equipment
8: 552: 319: 261: 162:
According to business continuity planning methodology, the RTO is established during the
108: 84: 53: 1232:
Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, 2009.
67:, such as a storm or battle. DR employs policies, tools, and procedures with a focus on 1517: 1054: 1031: 587: 394:
2015 disaster recovery statistics suggest that downtime lasting for one hour can cost
214: 100: 1208: 159:
must be restored after a disruption in order to avoid a break in business continuity.
1429: 1421: 1400: 1392: 1363: 1353: 1336: 1326: 1309: 1299: 1233: 1006: 979: 577: 567: 330: 49: 1146:. University of Oregon's Community Service Center, (C) 2007, www.OregonShowcase.org 495:(UPS) and/or backup generator to keep systems going in the event of a power failure 482:
local mirrors of systems and/or data and use of disk protection technology such as
156: 61: 57: 1499: 1186: 428:
These controls are documented and exercised regularly using so-called "DR tests".
1550: 1000: 344: 1484: 935: 265: 1433: 364:
Disasters can be the result of three broad categories of threats and hazards.
1539: 1425: 1404: 1396: 801: 720: 471: 1350:
Business Continuity Planning : a Step-by-Step Guide With Planning Forms
1340: 1313: 464:
representation called Open Virtualization Format, and can be easily restored
169: 1375: 323: 1371: 1367: 626:. Georgetown University - University Information Services. Archived from 537: 520:
A modular data center connected to the power grid at a utility substation
120: 27:
Maintaining or reestablishing vital information technology infrastructure
498:
fire prevention/mitigation systems such as alarms and fire extinguishers
972:"Setting the Maximum Tolerable Downtime -- setting recovery objectives" 627: 409: 96: 68: 198:
is the critical metric for business continuity and disaster recovery.
305: 133:
launched a specific standard supporting Business Continuity Standard
104: 183:
RTO is a complement of RPO. The limits of acceptable or "tolerable"
155:
is the targeted duration of time and a service level within which a
83:
is a subset of BCP, which relies on the metrics (frequently used as
542: 334: 309: 134: 64: 1323:
Disaster survival planning : a practical guide for businesses
821:"Like The NFL Draft, Is The Clock The Enemy Of Your Recovery Time" 1414:"Business Continuity and Disaster Recovery: Back Up Or Shut Down" 249: 777:"ISO 22301 to be published Mid May - BS 25999-2 to be withdrawn" 516: 845: 825: 450:
backups to disk on-site (copied to off-site disk) or off-site
1143: 893:"How to fit RPO and RTO into your backup and recovery plans" 998: 483: 140: 936:"Data transfer and synchronization between mobile systems" 841:"Three Reasons You Can't Meet Your Disaster Recovery Time" 718: 653: 461: 1096:"SunGard to be a vital presence in the banking industry" 248:
The recovery metrics can be converted to/used alongside
48:) is the process of maintaining or reestablishing vital 624:"'Systems and Operations Continuity: Disaster Recovery" 1252:"How to Use the Cloud as a Disaster Recovery Strategy" 1201: 1383:
DiMattia, Susan S (2001). "Planning for Continuity".
1093: 1325:. Port Hueneme, CA, US: Disaster Survival Planning. 958:
real-time ... provide redundancy and back-up to ...
391:) saves society $ 4 in response and recovery costs. 87:) of recovery point/time objectives. It encompasses 1074:"US tech firm Sungard announces 50 jobs for Dublin" 352:(RaaS) is widely availability and promoted by the 1113:SecaaS Category 9 // BCDR Implementation Guidance 505: 1537: 969: 501:anti-virus software and other security measures. 213:is the maximum acceptable interval during which 1132:. US Department of Homeland Security. May 2018. 304:At that time, most systems were batch-oriented 1071: 1060:...the disaster-recovery industry has grown to 271: 1352:. Brookfield, CT: Rothstein Associates, Inc. 224:as a daily off-site backup will not suffice. 114: 95:. It also incorporates IT infrastructure and 1027:"Catastrophe? It Can't Possibly Happen Here" 1094:Cassandra Mascarenhas (November 12, 2010). 719:M. Niemimaa; Steven Buchanan (March 2017). 682:. Disaster Recovery Institute International 650:"Disaster Recovery and Business Continuity" 204: 34:(BCP). For societal disaster recovery, see 1518:"RPO (Recovery Point Objective) Explained" 146: 976:IT Disaster Recovery Planning For Dummies 887: 885: 815: 813: 811: 680:"What is Business Continuity Management?" 1277:"Disaster Recovery as a Service (DRaaS)" 862: 860: 858: 856: 721:"Information systems continuity process" 515: 168: 75: 30:This article is about a sub-practice of 1296:A guide to business continuity planning 1249: 1050:"Commercial Property/Disaster Recovery" 915: 833: 190: 14: 1538: 999:William Caelli; Denis Longley (1989). 882: 808: 742:"2017 IT Service Continuity Directory" 478:Precautionary strategies may include: 227: 1166:"The Importance of Disaster Recovery" 853: 326:of IT systems became more important. 252:metrics. Common measurements include 404:large enterprises $ 700,000 or more. 401:mid-size organizations $ 74,000, and 583:Information System Contingency Plan 416: 24: 1287: 72:and services to a secondary site. 25: 1577: 1469: 1412:Harney, John (July–August 2004). 1002:Information Security for Managers 802:"ITIL glossary and abbreviations" 447:backups to tape and sent off-site 359: 143:has defined some of these terms. 1072:Charlie Taylor (June 30, 2015). 280: 1269: 1243: 1226: 1179: 1158: 1136: 1119: 1105: 1100:SunGard ... Sri Lanka's future. 1087: 1065: 1042: 1019: 992: 970:Peter H. Gregory (2011-03-03). 963: 942: 928: 909: 289:hardware complete the package. 1298:. Chichester, NY: John Wiley. 1250:Brandon, John (23 June 2011). 794: 769: 734: 712: 694: 672: 642: 616: 593:Recovery Consistency Objective 525:Disaster recovery as a service 506:Disaster recovery as a service 312:was relatively less critical. 211:Recovery Point Objective (RPO) 13: 1: 609: 431: 243: 153:Recovery Time Objective (RTO) 131:British Standards Institution 89:IT disaster recovery planning 1116:CSA, retrieved 14 July 2014. 548:Business continuity planning 493:uninterruptible power supply 217:is lost from an IT service. 81:IT service continuity (ITSC) 32:business continuity planning 7: 1500:"IT Disaster Recovery Plan" 1187:"IT Disaster Recovery Plan" 868:"Understanding RPO and RTO" 702:"Defending The Data Strata" 530: 443:Common strategies include: 382: 272:Data synchronization points 10: 1582: 728:.com (ACM Digital Library) 558:Continuous data protection 509: 295: 258:mean time to first failure 254:mean time between failures 196:Recovery Time Actual (RTA) 118: 115:Principles of backup sites 29: 1098:. Wijeya Newspapers Ltd. 1005:. Springer. p. 177. 978:. Wiley. pp. 19–22. 781:Business Continuity Forum 749:Disaster Recovery Journal 1348:Fulmer, Kenneth (2015). 398:small companies $ 8,000, 337:facilities were sought. 205:Recovery Point Objective 164:business impact analysis 18:Recovery point objective 1481:recoveryspecialties.com 1321:Bell, Judy Kay (2000). 1189:. FEMA. 25 October 2012 1082:Sungard .. founded 1978 354:Cloud Security Alliance 222:continuously maintained 147:Recovery Time Objective 1294:Barnes, James (2001). 563:Disaster recovery plan 521: 389:disaster recovery plan 180: 93:IT resilience planning 46:disaster recovery (DR) 950:"Amendment #5 to S-1" 918:"Finding RPO and RTO" 598:Remote backup service 519: 512:Recovery as a service 438:cost-benefit analysis 350:Recovery as a Service 172: 76:IT service continuity 1035:. January 29, 1995. 708:. December 24, 2013. 706:ForbesMiddleEast.com 603:Virtual tape library 573:Emergency management 455:storage area network 320:real-time processing 191:Recovery Time Actual 42:IT disaster recovery 36:emergency management 1556:Business continuity 1418:AIIM E-DOC Magazine 1058:. October 9, 1994. 849:. October 10, 2013. 660:on January 11, 2013 553:Business continuity 262:mean time to repair 228:Relationship to RTO 109:data communications 85:key risk indicators 1566:IT risk management 1055:The New York Times 1037:.. patient records 1032:The New York Times 588:Real-time recovery 522: 215:transactional data 181: 1546:Disaster recovery 1238:978-0-07-148755-9 1213:DRI International 829:. April 30, 2015. 578:High availability 568:Disaster response 331:high-availability 179: 16:(Redirected from 1573: 1532: 1530: 1529: 1513: 1511: 1510: 1495: 1493: 1492: 1483:. Archived from 1465: 1457: 1449: 1441: 1436:. Archived from 1408: 1379: 1344: 1317: 1281: 1280: 1273: 1267: 1266: 1264: 1262: 1247: 1241: 1230: 1224: 1223: 1221: 1220: 1205: 1199: 1198: 1196: 1194: 1183: 1177: 1176: 1174: 1172: 1162: 1156: 1155: 1153: 1151: 1140: 1134: 1133: 1131: 1123: 1117: 1109: 1103: 1102: 1091: 1085: 1084: 1069: 1063: 1062: 1046: 1040: 1039: 1023: 1017: 1016: 996: 990: 989: 967: 961: 960: 946: 940: 939: 932: 926: 925: 920:. Archived from 913: 907: 906: 904: 903: 889: 880: 879: 877: 875: 864: 851: 850: 837: 831: 830: 817: 806: 805: 798: 792: 791: 789: 788: 773: 767: 766: 764: 763: 757: 751:. Archived from 746: 738: 732: 731: 716: 710: 709: 698: 692: 691: 689: 687: 676: 670: 669: 667: 665: 656:. Archived from 646: 640: 639: 637: 635: 620: 417:Control measures 173: 157:business process 21: 1581: 1580: 1576: 1575: 1574: 1572: 1571: 1570: 1561:Data management 1536: 1535: 1527: 1525: 1516: 1508: 1506: 1498: 1490: 1488: 1475: 1472: 1460: 1452: 1444: 1411: 1385:Library Journal 1382: 1360: 1347: 1333: 1320: 1306: 1293: 1290: 1288:Further reading 1285: 1284: 1275: 1274: 1270: 1260: 1258: 1248: 1244: 1231: 1227: 1218: 1216: 1207: 1206: 1202: 1192: 1190: 1185: 1184: 1180: 1170: 1168: 1164: 1163: 1159: 1149: 1147: 1142: 1141: 1137: 1129: 1125: 1124: 1120: 1110: 1106: 1092: 1088: 1078:The Irish Times 1070: 1066: 1048: 1047: 1043: 1025: 1024: 1020: 1013: 997: 993: 986: 968: 964: 948: 947: 943: 938:. May 14, 2013. 934: 933: 929: 914: 910: 901: 899: 891: 890: 883: 873: 871: 866: 865: 854: 839: 838: 834: 819: 818: 809: 800: 799: 795: 786: 784: 775: 774: 770: 761: 759: 755: 744: 740: 739: 735: 717: 713: 700: 699: 695: 685: 683: 678: 677: 673: 663: 661: 648: 647: 643: 633: 631: 622: 621: 617: 612: 607: 533: 514: 508: 434: 419: 385: 362: 345:cloud computing 298: 283: 274: 246: 230: 207: 193: 149: 123: 117: 78: 39: 28: 23: 22: 15: 12: 11: 5: 1579: 1569: 1568: 1563: 1558: 1553: 1548: 1534: 1533: 1514: 1496: 1471: 1470:External links 1468: 1467: 1466: 1458: 1450: 1442: 1440:on 2008-02-04. 1409: 1380: 1358: 1345: 1331: 1318: 1304: 1289: 1286: 1283: 1282: 1268: 1242: 1225: 1200: 1178: 1157: 1135: 1118: 1104: 1086: 1064: 1041: 1018: 1011: 991: 985:978-1118050637 984: 962: 941: 927: 924:on 2016-03-03. 908: 881: 852: 832: 807: 793: 768: 733: 711: 693: 671: 641: 630:on 26 Feb 2012 614: 613: 611: 608: 606: 605: 600: 595: 590: 585: 580: 575: 570: 565: 560: 555: 550: 545: 540: 534: 532: 529: 510:Main article: 507: 504: 503: 502: 499: 496: 489: 486: 476: 475: 468: 465: 458: 451: 448: 433: 430: 418: 415: 406: 405: 402: 399: 384: 381: 377: 376: 373: 369: 361: 360:Classification 358: 333:solutions for 297: 294: 282: 279: 273: 270: 266:mean down time 245: 242: 229: 226: 206: 203: 192: 189: 148: 145: 119:Main article: 116: 113: 101:communications 91:and the wider 77: 74: 50:infrastructure 44:(also, simply 26: 9: 6: 4: 3: 2: 1578: 1567: 1564: 1562: 1559: 1557: 1554: 1552: 1549: 1547: 1544: 1543: 1541: 1523: 1519: 1515: 1505: 1501: 1497: 1487:on 2020-11-14 1486: 1482: 1478: 1474: 1473: 1463: 1459: 1455: 1451: 1447: 1443: 1439: 1435: 1431: 1427: 1423: 1419: 1415: 1410: 1406: 1402: 1398: 1394: 1391:(19): 32–34. 1390: 1386: 1381: 1377: 1373: 1369: 1365: 1361: 1359:9781931332804 1355: 1351: 1346: 1342: 1338: 1334: 1332:9780963058027 1328: 1324: 1319: 1315: 1311: 1307: 1305:9780470845431 1301: 1297: 1292: 1291: 1278: 1272: 1257: 1253: 1246: 1239: 1235: 1229: 1214: 1210: 1204: 1188: 1182: 1167: 1161: 1145: 1139: 1128: 1122: 1115: 1114: 1108: 1101: 1097: 1090: 1083: 1079: 1075: 1068: 1061: 1057: 1056: 1051: 1045: 1038: 1034: 1033: 1028: 1022: 1014: 1008: 1004: 1003: 995: 987: 981: 977: 973: 966: 959: 955: 951: 945: 937: 931: 923: 919: 916:Richard May. 912: 898: 897:SearchStorage 894: 888: 886: 870:. DRUVA. 2008 869: 863: 861: 859: 857: 848: 847: 842: 836: 828: 827: 822: 816: 814: 812: 803: 797: 782: 778: 772: 758:on 2018-11-30 754: 750: 743: 737: 729: 727: 722: 715: 707: 703: 697: 681: 675: 659: 655: 651: 645: 629: 625: 619: 615: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 561: 559: 556: 554: 551: 549: 546: 544: 541: 539: 536: 535: 528: 526: 518: 513: 500: 497: 494: 490: 487: 485: 481: 480: 479: 473: 472:cloud storage 469: 466: 463: 459: 456: 452: 449: 446: 445: 444: 441: 439: 429: 426: 422: 414: 411: 403: 400: 397: 396: 395: 392: 390: 380: 374: 370: 367: 366: 365: 357: 355: 351: 346: 341: 338: 336: 332: 327: 325: 321: 316: 313: 311: 307: 302: 293: 290: 286: 281:System design 278: 269: 267: 263: 259: 255: 251: 241: 237: 233: 225: 223: 218: 216: 212: 202: 199: 197: 188: 186: 177: 171: 167: 165: 160: 158: 154: 144: 142: 138: 136: 132: 129:In 2008, the 127: 122: 112: 110: 106: 102: 98: 94: 90: 86: 82: 73: 70: 66: 63: 62:human-induced 59: 55: 51: 47: 43: 37: 33: 19: 1526:. Retrieved 1524:. 2019-08-08 1521: 1507:. Retrieved 1503: 1489:. Retrieved 1485:the original 1480: 1438:the original 1417: 1388: 1384: 1349: 1322: 1295: 1271: 1259:. Retrieved 1255: 1245: 1228: 1217:. Retrieved 1215:. 2021-08-16 1212: 1203: 1191:. Retrieved 1181: 1169:. Retrieved 1160: 1148:. Retrieved 1138: 1121: 1112: 1107: 1099: 1089: 1081: 1077: 1067: 1059: 1053: 1044: 1036: 1030: 1021: 1001: 994: 975: 965: 957: 953: 944: 930: 922:the original 911: 900:. Retrieved 896: 874:February 13, 872:. Retrieved 844: 835: 824: 796: 785:. Retrieved 783:. 2012-05-03 780: 771: 760:. Retrieved 753:the original 748: 736: 724: 714: 705: 696: 684:. Retrieved 674: 662:. Retrieved 658:the original 644: 632:. Retrieved 628:the original 618: 523: 477: 442: 435: 427: 423: 420: 407: 393: 386: 378: 363: 343:The rise of 342: 339: 328: 324:Availability 317: 314: 303: 299: 291: 287: 284: 275: 264:(MTTR), and 247: 238: 234: 231: 219: 210: 208: 200: 195: 194: 182: 161: 152: 150: 139: 128: 124: 92: 88: 80: 79: 56:following a 45: 41: 40: 1240:. Page 480. 1171:October 29, 1150:October 29, 538:Backup site 121:Backup site 99:related to 1540:Categories 1528:2021-09-02 1509:2021-09-02 1491:2021-09-02 1434:1058059544 1376:1127407034 1219:2021-09-02 1012:1349101370 902:2019-05-20 787:2021-11-20 762:2018-11-30 610:References 491:use of an 457:technology 432:Strategies 410:IT systems 306:mainframes 244:Mean times 103:, such as 69:IT systems 1504:Ready.gov 1426:1544-3647 1405:425551440 1397:0363-0277 1372:905750518 1368:712628907 372:releases. 105:telephony 1341:45755917 1314:50321216 543:BS 25999 531:See also 383:Planning 335:hot-site 310:downtime 260:(MTFF), 256:(MTBF), 178:and RTO. 135:BS 25999 97:services 65:disaster 954:SEC.gov 686:20 July 664:20 July 634:20 July 296:History 268:(MDT). 250:failure 58:natural 54:systems 1551:Backup 1464:. ISO. 1456:. ISO. 1448:. ISO. 1432:  1424:  1403:  1395:  1366:  1356:  1339:  1329:  1312:  1302:  1261:11 May 1236:  1193:11 May 1009:  982:  846:Forbes 826:Forbes 1130:(PDF) 756:(PDF) 745:(PDF) 1430:OCLC 1422:ISSN 1401:OCLC 1393:ISSN 1364:OCLC 1354:ISBN 1337:OCLC 1327:ISBN 1310:OCLC 1300:ISBN 1263:2013 1234:ISBN 1195:2013 1173:2018 1152:2018 1007:ISBN 980:ISBN 876:2013 688:2024 666:2024 636:2024 484:RAID 185:ITSC 151:The 141:ITIL 107:and 52:and 1522:IBM 1389:126 1256:Inc 726:ACM 654:IBM 462:XML 408:As 176:RPO 60:or 1542:: 1520:. 1502:. 1479:. 1428:. 1420:. 1416:. 1399:. 1387:. 1374:, 1370:, 1362:. 1335:. 1308:. 1254:. 1211:. 1080:. 1076:. 1052:. 1029:. 974:. 956:. 952:. 895:. 884:^ 855:^ 843:. 823:. 810:^ 779:. 747:. 723:. 704:. 652:. 474:). 356:. 322:. 209:A 111:. 1531:. 1512:. 1494:. 1407:. 1378:. 1343:. 1316:. 1279:. 1265:. 1222:. 1197:. 1175:. 1154:. 1015:. 988:. 905:. 878:. 804:. 790:. 765:. 730:. 690:. 668:. 638:. 38:. 20:)

Index

Recovery point objective
business continuity planning
emergency management
infrastructure
systems
natural
human-induced
disaster
IT systems
key risk indicators
services
communications
telephony
data communications
Backup site
British Standards Institution
BS 25999
ITIL
business process
business impact analysis

RPO
ITSC
transactional data
continuously maintained
failure
mean time between failures
mean time to first failure
mean time to repair
mean down time

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑