Skip to main content

Week 11 Cloud Computing

 

Business Continuity Plan (BCP)

Purpose:

·         A Business Continuity Plan is a comprehensive strategy to ensure critical business functions operate during and after a disaster or disruption.

·         It outlines the procedures and processes for maintaining or restoring business operations.

Components:

·         Risk Assessment: Identifying potential threats and vulnerabilities.

·         Recovery Strategies: Detailed plans for resuming key operations.

·         Roles and Responsibilities: Assigning tasks and responsibilities to specific personnel.

·         Communication Plan: Ensuring effective communication during a crisis.

·         Testing and Training: Regularly test the plan and train staff to ensure preparedness.

Focus:

·         The focus of a BCP is on the how-to aspect of continuing business operations, including the steps to take before, during, and after a disruption.

Business Impact Analysis (BIA)

Purpose:

·         A Business Impact Analysis is a systematic process used to identify and evaluate the potential effects of disruptions to business operations.

·         It helps in understanding the criticality of different business functions and the impact of their interruption.

Components:

·         Identification of Critical Functions: Determining which functions are essential to business operations.

·         Impact Assessment: Evaluating disruptions' financial, operational, and reputational impact on these functions.

·         Recovery Time Objectives (RTO): Establishing the maximum acceptable downtime for each critical function.

·         Dependencies: Identifying internal and external dependencies that are crucial for operations.

Focus:

·         The focus of a BIA is on analysis and assessment, helping organizations prioritize their resources and recovery efforts based on the potential impact of disruptions.

 

 

Comments

Popular posts from this blog

System Hardening Week 9

  Assume Breach and Be Proactive: Traditional cybersecurity is reactive, responding to known attack methods. However, sophisticated adversaries continuously evolve their tactics to bypass security solutions. Threat hunting operates under an “assume breach” mindset. It seeks to uncover indications of attack (IOA) that haven’t been detected yet. The goal is to outthink the attacker by identifying and mitigating threats before they access sensitive data.

Week 7 Cloud Computing.

  Cloud Computing vs. Internet of Things (IoT) Cloud Computing Cloud computing refers to the delivery of computing services (such as servers, storage, databases, networking, software, and analytics) over the internet ("the cloud"). Key characteristics include: ·          On-Demand Resources : Users can access resources as needed without physical hardware. ·          Scalability : Easily scale resources up or down based on demand. ·          Cost-Effectiveness : Pay-as-you-go pricing models reduce the need for significant upfront investments in hardware. ·          Accessibility : Access services from anywhere with an internet connection. Internet of Things (IoT) The Internet of Things (IoT) is a network of interconnected devices that collect and exchange data. These devices can include anything from smart home appliances t...

week 10 Cloud Computing.

  File Storage Description: Structure: Hierarchical, using directories and subdirectories. Data Organization: Files are stored with metadata like filename, timestamps, and permissions. Advantages: Familiarity: Easy for users to understand and manage, akin to traditional file systems. Ideal Use Cases: Great for storing and managing documents, media files, and shared drives. Block Storage Description: Structure: Data is divided into fixed-sized blocks. Data Organization: Each block has a unique identifier, but no metadata is attached directly. Advantages: Performance: High performance and low latency. Flexibility: The operating system can be formatted and used as required. Ideal Use Cases: Databases: Suitable for database applications. Virtual Machines: Commonly used for VM storage and high-performance applications.