Retrieved from https://studentshare.org/information-technology/1680758-disaster-recovery-andor-business-continuity-plan
https://studentshare.org/information-technology/1680758-disaster-recovery-andor-business-continuity-plan.
Cyber security Disaster Recovery and Business Continuity Cyber security is a process of applying security measures to ensure data availability, its confidentiality and also its integrity as a plan for Disaster Recovery and Business Continuity Plan. It assures protection of assets and also humans. The primary objective of cyber security is the protection of data whether transit or at rest. For full protection to be achieved, certain measures have to be put in place, like safety evaluation, penetration testing, risk assessment, authorization, and vulnerability administration.
Computer Security is applied to computing devices as well as computer networks and the whole internet, thereby growing importance increasing computer reliance in society (Cerullo & Cerullo, 2004). This bears physical security to prevent theft and information security for data protection to allow access to the data. Disaster recovery emphasizes on technology systems supporting life-threatening business functions different from the commercial community that keeps all essential business aspects despite disruptive happenings.
Disaster Recovery and Business Continuity Plan is consequently a subnet of the business steadiness (Cerullo & Cerullo, 2004). Disaster Recovery Technology SolutionsPalindrome Palindrome is a Data Backup Solutions solution system that focuses on Disaster Recovery (https://www.youtube.com/watch?v=d60m6hUpgvs), and it enforces confidentiality, in that no access can be granted once a backup has been done. As such, data integrity is assured and maintained through providing accurate and consistent data over the solution’s lifecycle (Sredni, 2015).
This means that data cannot be modified in an unlicensed or undetected manner. This solution also avails data by ensuring that all the security controls and the communication channels used to access it function correctly to enable ease of access. User authentication is also provided, in that parties involved pass through a validation process for a justification the data, transactions, communications or documents they engage with are genuine. According to Cerullo & Cerullo (2004), modern Palindrome technology is incorporated with verification features like “digital signs” that approve the validity of data through verifying that any message sent possesses a valid signing key, hence non-repudiation is ensured.
Acronis Acronis (http://www.acronis.com/solutions/smallbusiness/) is another tool for Disaster Recovery and Business Continuity Plan, providing data backup solutions. As an automated data recovery tool, it ensures easy retrieval and restoration of crucial data in cases of cyber security vulnerabilities like hacking and virus attack. As such, this solution minimizes risks of information alterations, as well as depletion of data originality. This is enhanced by its platform that supports a strategy focused on combining server, cloud, and virtual systems into one to offer flawless and quick restore of data.
Acronis also ensures business continuity plan by promoting data loss prevention through installation of a systematic strategy and objective that identifies and protect crucial assets and information processes. This policy is implemented by offering secure access to resources, in the form of authentication and verification before accessing data, thereby enhancing confidentiality, integrity and authenticity to ensure that critical data is not compromised and that it is always availability (Cerullo & Cerullo, 2004).
ConclusionIn a nutshell, data security is always crucial to efficient business operation. In fact, most enterprises consider it a substantial asset. Thus, it is worth to be protected. This can be achieved through adopting and implementing one of these two solutions discussed in this paper, whose their viability has been confirmed ReferencesCerullo, V., & Cerullo, M. J. (2004). Business continuity planning: A comprehensive approach. Information Systems Management, 21(3), 70-78.Sredni, I. (2015).
Palindrome Disaster Recovery & Business Continuity solutions. Retrieved March 3, 2015, from YouTube: https://www.youtube.com/watch?v=d60m6hUpgvs
Read More