Explore chapters and articles related to this topic
Blockchain System Implementation
Published in Shaun Aghili, The Auditor's Guide to Blockchain Technology, 2023
Bharghava Sai Nakkina, Deepthi Gudapati, Naga Venkat Palaparthy, Sai Sreenath Sadupally
A disaster recovery plan (DRP) is an essential business document that describes how an organization can quickly resume work after an unplanned incident. The disaster recovery plan is an essential part of a business continuity plan, designed to assist the company in the recovery of system functionality and prevention of data loss to ensure a smooth resumption of operations in the aftermath of an incident. The primary objective is to balance the cost of downtime along with the cost of continuity of business for the critical systems. For business enterprises, disaster recovery is a top priority [4].
Benefits and Risks of Cloud Computing
Published in Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan, Advancing Computational Intelligence Techniques for Security Systems Design, 2023
Osheen Oberoi, Sahil Raj, Viput Ongsakul, Vishal Goyal
Cloud computing enables a set of shared computing services, inclusive of servers, storage, software, analytics, networking, and databases, over the web, i.e., the cloud on a utility basis [3]. The notion of cloud computing is to change traditional desktop computing to service-oriented computing. Cloud technology is popular among individuals and various business organizations as it is a cost-effective model and proliferates the productivity, efficiency, and economies of scale of a business. Along with this, cloud solutions are extremely reliable and also offer disaster recovery. Moreover, this model enables the users with a performance monitoring facility including the hallmark feature of cloud computing to scale dynamically. Undeniably, cloud computing plays an indispensable role in rendering the burgeoning storage and infrastructure demand in the IT field. Besides, cloud service providers authorize users to store and access data, applications, and programs from the cloud server through the internet [4]. Cloud computing models are scalable; therefore they serve the fluctuating needs of organizations and provide them with optimal resource availability at all times.
Security Concerns of Virtualization in Cloud Computing
Published in T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy, Privacy and Security Challenges in Cloud Computing, 2022
Darshana A. Naik, G. Shruthi, A. Ashwitha, Pramod Sunagar
Disaster recovery is the mechanism by which normal activities are resumed by regaining access to data, hardware and software, networking equipment, electricity, and communication after a disaster. However, operations may also apply to practical issues such as seeking alternative workplaces, repairing communications, or sourcing everything from desks and computers to employee transportation if the facilities are damaged or demolished. The response to disaster recovery should adopt a recorded practice or usual of processes precisely intended to arrange the association aimed at retrieval in the unswerving conceivable situation, a disaster salvage strategy.
A systematic review on supply chain risk management: using the strategy-structure-process-performance framework
Published in International Journal of Logistics Research and Applications, 2020
Mikihisa Nakano, Antonio K. W. Lau
The Process variables are also divided into internal and external. The variables of internal process were found in 37 articles. The most frequent variable is ‘risk planning’ (15 of the 37). There are two kinds: contingency planning, which means disaster-recovery planning, and business continuity planning, which goes beyond disaster-recovery planning and includes the actions to be taken, resources required, and procedures to be followed to ensure the continued availability of essential services, programmes, and operations in the event of unexpected interruptions (Norrman and Jansson 2004). These planning processes are carried out under the reactive strategy (Tukamuhabwa et al. 2015; Wieland and Wallenburg 2012). The second frequent variable is ‘information and communication technology (ICT) utilization’ (13 of the 37). This includes various functions, for example, tracking/tracing/monitoring (Blackhurst, Dunn, and Craighead 2011; Brusset and Teller 2017; Chowdhury and Quaddus 2016; Norrman and Jansson 2004), warning/reporting/predicting (Blackhurst, Dunn, and Craighead 2011; Chowdhury and Quaddus 2016; Wiengarten et al. 2016), planning such as advanced planning system (APS) (Chowdhury and Quaddus 2015; Lavastre, Gunasekaran, and Spalanzani 2012, 2014; Shenoi, Dath, and Rajendran 2016), and integrating such as enterprise resource planning (ERP) (Brusset and Teller 2017; Ellinger et al. 2015; Riley et al. 2016). Other frequent variables are ‘collaboration’ including working together and ‘information sharing’.
Perceived potential for value creation from cloud computing: a study of the Australian regional government sector
Published in Behaviour & Information Technology, 2018
Omar Ali, Jeffrey Soar, Anup Shrestha
The results obtained through this research indicates that the adoption of cloud computing in government organisations can lead to considerable cost reductions (Al-Ismaili et al. 2016; Jain and Bhardwaj 2010; Saeed, Juell-Skielse, and Uppström 2011; Saini et al. 2011; Zhang, Cheng, and Boutaba 2010), reduced infrastructure requirements for ICT (Das, Patnaik, and Misro 2011; Marston et al. 2011) and improved quality of service delivery where services were provided to the customers in a convenient and time-saving manner (Al-Khouri 2011; Goel et al. 2012; Sharma, Sharma, and Singh 2012). Cloud computing is undoubtedly capable of reducing the challenges related to maintenance faced by the regional governments (Saeed, Juell-Skielse, and Uppström 2011). The network redundancy of cloud lowers the risks related to disaster recovery and associated expenses (Rajkumar, James, and Andrzej 2011). Cloud computing adoption leads to a reduction of IT staff required by the regional Governments (West 2011). These results confirm the findings from the extant literature. However, the following three anticipated benefits, albeit quite obvious for the cloud computing technology, had not been discussed in past research: remote access, time efficiencies and risk minimisation.
A Survey on Cloud Computing Applications in Smart Distribution Systems
Published in Electric Power Components and Systems, 2018
Jeovane V. de Sousa, Denis V. Coury, Ricardo A. S. Fernandes
One of the factors that affect the level of security and privacy issues is the deployment model of a cloud. Depending on the situation, there is a tradeoff between security and compatibility versus complexity and cost efficiency, related to private clouds versus public clouds [15,85]. Private clouds, when compared with public clouds, do not have some advantages such as non-upfront investment, lower operating cost, high scalability, easy access, and reduced business risks and maintenance expenses, but are highly secure with respect to cyber-attacks. This is because the physical hardware is usually on the utility´s premises [58]. On the other hand, spreading data over different cloud providers off premise around the world can improve the disaster recovery ability of this data.