Explore chapters and articles related to this topic
Cloud computing for big data
Published in Jun Deng, Lei Xing, Big Data in Radiation Oncology, 2019
In today’s digital economy, the loss of critical data can be costly and even life threatening for health care institutions. Data loss can occur for many reasons, including hardware failures, human error, or malicious events. Fortunately, data durability is one of the most useful features of Cloud computing. Thanks to redundant distribution of data across multiple geographical locations, true loss of data is vanishingly rare in Cloud systems. Amazon S3, for instance, boasts that its data durability is better than 99.999999999%, meaning that less than 10 files in a trillion (1012) could be irreversibly lost in any given year. At this level, data loss is much more likely to be caused by user error or malicious attacks. Crypto viruses in particular have become an increasing threat in recent years, crippling research and hospital IT systems. Cloud systems are better protected against such threats than individual institutions or hospitals installations because they allocate significant amounts of expert resources to securing the system.
Moving forward by looking back
Published in Henrik Ringbom, Erik Røsæg, Trond Solvang, Autonomous Ships and the Law, 2020
In the field of marine insurance, the cyber threat is not well defined, with confusion surrounding definitions based on different causes and consequences. One of the mainstream definitions categorizes cyber risks as being malicious attacks with various motivations or else non-malicious events, such as technical failures or human operating errors.34 The consequences that cause the greatest concern include physical injuries and loss of property, data loss, business interruption, and theft of intellectual property.35
Tools of the Host
Published in Gideon Samid, Computer-Organized Cost Engineering, 2020
The best remedy against data loss is data backup. PC Hard disk users often copy an importnt file to a diskette which if not misplaced or overwritten will serve as a proper backup — for that file. The practical problem today is that proper operation depends on an array of files which the user himself may not know where they all are. And so backing up one file will not be too helpful when the hard disk crushes or is otherwise lost. A cost engineer may produce a price schedule on a desk top publisher program like Xerox Ventura. He or she may think that the copy of the text file of the document combined with the distribution diskettes of Ventura, will be sufficient to reconstruct the printed document. First, when a product like Ventura is installed on a hard disk, the 15 diskettes or so are copied over on the basis of user response to installation menu. If the user does not recall how he or she answered the menu prompts beforehand, the installed product will not be the same, and so for the printed document. Ventura like most other PC products, will create freely directories and sub-directories and funnel the various files as it sees fit. Eventually the printed page will include file information from one directory, style information from another directory, chapter information, font information, additional frame data, etc., each from a different file on a different directory. The recommended solution to this complexity is a complete dump of the entire disk drive followed by update backups. DOS offers backup to diskettes, and the newer technology allows fast backup into disk drives. The more data-dependent the business, the more critical the backup, and the more attractive the tape drive. Yet, in a classic about-face of modern technology, tape-drive manufacturers encountered an unexpected competitor. Banking on the high raw speed of data transfer of modern diskettes, innovative utility programmers developed software that bypasses the operating system and “talks to the bare metal,” as the phrase goes, and today one can back up a full 40-megabyte drive to 30 or so high-density diskettes in a matter of 5-10 minutes-just as much time as it takes with a typical tape drive, but without the $500 expense.
A user perspective on future cloud-based services for Big Earth data
Published in International Journal of Digital Earth, 2021
Julia Wagemann, Stephan Siemen, Bernhard Seeger, Jörg Bendix
We asked the respondents to rate the level of risk (no risk at all, risk, major risk) of five security aspects related to cloud-based services: (i) data integrity (assurance of the accuracy and consistency of a data set over its entire life-cycle), (ii) data breaches (data information is copied, viewed, transmitted, stolen or used from unauthorized individuals), (iii) data loss (data information is destroyed and cannot be recovered), (iv) service unavailability (service is not continuously available) and (v) security of private / restricted data. At least two-thirds of the respondents rated all given security aspects as risk or major risk, with ‘service unavailability’, ‘data loss’ and ‘data security’ being the top three security concerns (Figure 6). Other risks mentioned included e.g. a changing business model of the cloud vendor, low data transfer rates, general law restrictions related to a different geographic location of the cloud or migration to a different cloud provider.
Proposal of an insider sabotage detection method for nuclear security using deep learning
Published in Journal of Nuclear Science and Technology, 2019
Lossy transmission is a common problem in monitoring systems. Data loss can occur because of network problems, operational errors, computer viruses, unexpected accidents, and so on. It is thus important to verify whether satisfactory detection results can be achieved even when image frames are lost. In addition, the robustness of our motion recognition method against data loss should be evaluated.