Ask a question from expert

Ask now

Business Continuity and Disaster Recovery Plan (Doc)

4 Pages800 Words187 Views
   

Added on  2020-04-21

Business Continuity and Disaster Recovery Plan (Doc)

   Added on 2020-04-21

BookmarkShareRelated Documents
Running head: BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANBusiness Continuity Plan and Disaster Recovery PlanName of the StudentName of the UniversityAuthor Note
Business Continuity and Disaster Recovery Plan (Doc)_1
1 BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANThe challenges, which the incident handlers face when the data is being moved fromthe local servers to the cloud environment, are large in number (Debar, Curry & Feinstein,2007). Apart from the challenges of creating and maintaining of a cloud environment thereare also the following problems that is being faced by the incident handlers are:Identifying the relevant data resources: It cannot be directly said which of the filesis to pose a problem related to the incident detection. Especially for the system of SaaS andPaaS different methodologies needs to be implemented into these paradigms to make thedetection of the paradigms effective (Grobauer & Schreck, 2010).Event information standardization: There are no standard developed in the field ofmaking an existing initiative for the making of a standard event information sharingprotocol. The event handlers should develop a common form of sharing information towork on the information received from the event generated.Logging based on specific customers: The essential characteristics of a cloud for the useof resource pooling has led to the making of multitenant infrastructure. Thus, the events,which are being generated by the infrastructures, are mainly in the field of non-customerspecific portions of the main infrastructure, resources from a single customer andresources collected from several customers. For the provision of access of the customersto the events the cloud service providers has two goals. There should be viewable forevent information to a single user but the information of other users should not be visibleto others (Christodorescu et al., 2009). Detection of missing information: the cloud service providers for the detection ofintrusion must take Security services in accordance to the intrusion detection intoaccount. The cloud service providers have minimum or no knowledge about the workingof the infrastructure of the cloud. This problem has been found in the IaaS and in PaaS. InIaaS the intrusion detection is used in the virtual machines without the knowledge of the
Business Continuity and Disaster Recovery Plan (Doc)_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC568 - Webb’s Stores Cloud Security Assignment
|9
|1868
|309

Major Concepts of Cloud Computing and its Deployment within Regional Gardens Ltd.
|6
|310
|169

Cloud Based Infrastructure for MetaSoft
|10
|561
|335

Communication Issues & Security Risks
|10
|2696
|35

Identifying and Responding to Incidents in the Cloud Environment
|6
|874
|367

Cloud IaaS Security 9/20/2017 Introduction
|9
|1877
|298