婚煞是什么意思| 凌空什么什么| 自律是什么意思| 肌肤甲错是什么意思| 党参泡酒有什么功效| 为什么声音老是嘶哑| 奇妙是什么意思| 韩语思密达是什么意思| 人是由什么组成的| 五级士官是什么级别| 严重脱发是什么病先兆| 肉燕是什么做的| 脑萎缩有什么症状| 这是什么石头| 林冲属于什么生肖| 舌自心念什么| 肠胃炎拉肚子吃什么药| 没有淀粉可以用什么代替| 美尼尔症是什么病| 滑膜炎什么症状| 茉莉花茶有什么作用| 大腿肌肉疼是什么原因| 黄褐色是什么颜色| 植物神经紊乱吃什么药| 胃结石有什么症状表现| 富不过三代是什么意思| rainbow什么意思| 榴莲是什么季节的| 什么经验| 电动汽车什么牌子好| 9月19日是什么星座| 1.29是什么星座| 乳头长什么样| 腰疼不能弯腰是什么原因引起的| 毛重是什么| rj是什么意思| 柠檬泡水喝有什么好处| 槐树什么时候开花| 双鱼座的幸运石是什么| 为什么有胎记| 专科是什么| 坐月子吃什么水果好| 阿尔茨海默症是什么| 大小周休息是什么意思| 胡萝卜什么时候种| 荣五行属什么| 背部毛孔粗大是什么原因| 胃疼是什么病| 李克勤属什么生肖| 地藏菩萨求什么最灵| 牙龈痛吃什么药| 窦性心律过速吃什么药| 什么官许愿| 梦见石头是什么意思| 免疫力低会引起什么病| 蛋白粉什么牌子好| t是什么意思| 乳酸杆菌少或无是什么意思| 骷髅是什么意思| 甲亢都有什么症状| 十二生肖各代表什么花| 嘴唇干裂是什么原因| 下午3点到5点是什么时辰| tat是什么意思| 珝是什么意思| 枕戈待旦什么意思| 喜欢出汗是什么原因| 空调有异味是什么原因| 什么动物睡觉不闭眼| 血液生化检查能看出什么病| 8月11号是什么星座| 8月6日是什么星座| 乳腺结节有什么症状| 细菌属于什么生物| 吃什么养肝| 硬不起吃什么药| 为什么北京是首都| 994是什么意思| 婴儿的腿为什么是弯弯的| 肠胃炎可以吃什么药| 水瓶座的性格是什么| 什么蘑菇| 什么叫散光| 什么叫风湿| 月经2天就没了什么原因| 工作坊是什么意思| 微量泵是干什么用的| 头痛反胃想吐什么原因| 土生土长是什么生肖| 扑尔敏又叫什么| 橘子什么时候成熟| 医院总务科是干什么的| 右边小腹疼是什么原因| 痢疾吃什么药效果最好| 姨妈少是什么原因怎么办| 什么时候怀孕几率高| 肾积水有什么危害| pigeon是什么意思| 经常腿抽筋是什么原因| 一个月的小猫吃什么| 短杆菌是什么意思| 宝宝老是摇头是什么原因| 老年人吃什么奶粉好| 牛肉和什么菜炒好吃| 唐氏宝宝是什么意思| 爸爸是什么意思| 芙蓉什么意思| 身份证后4位代表什么| 大数据是什么专业| 肝什么相照| 坐镇是什么意思| 情绪不稳定易怒烦躁是什么症状| 风月是什么意思| 异地结婚登记需要什么证件| 细胞结构包括什么| 免疫肝是什么病| 51岁属什么生肖| 欺凌是什么意思| 什么前什么后| 什么国家的钱最值钱| 伤口好转的迹象是什么| 火把节是什么节日| 嗜酸性粒细胞偏高是什么原因| 腿毛长的男人代表什么| 粘连是什么意思| 妤什么意思| 纳采是什么意思| 带状疱疹能吃什么食物| 多读书有什么好处| 处口念什么| 什么红酒好喝| 为什么不能用红笔写名字| 小孩子腿疼是什么原因| 肺痿是什么意思| 448是什么意思| 左眼跳女人是什么预兆| penguin是什么意思| 吃什么补黄体酮| 人走了说什么安慰的话| 万中无一什么意思| 梦见坟墓是什么预兆| 偷换概念是什么意思| 水瓶座后面是什么星座| 1987是什么年| 吃鱼眼睛有什么好处| 什么叫尿毒症| 一直头疼是什么原因| 高血压变成低血压是什么原因| 天象是什么意思| 鸡精和味精有什么区别| 户籍所在地是什么| 什么叫人工智能| y是什么元素| 血热是什么原因| 喝竹叶水有什么好处| 氯仿是什么| 4月5号是什么星座| 石斛有什么功效和作用| 音叉是什么| 人为什么会得白血病| 新生儿吐奶是什么原因| 登对是什么意思| 轻如鸿毛是什么意思| 吃什么可以缓解孕吐恶心| 送命题是什么意思| 枫树的叶子像什么| 什么时候测试怀孕最准确的| 男龙和什么生肖最配| 更年期失眠吃什么药效果好| 肾结石检查什么项目| 五谷丰登是什么生肖| 侃大山什么意思| 拍大腿内侧有什么好处| 灵芝不能和什么一起吃| 外阴裂口用什么药| 送什么礼物好| 什么是正月| 去势是什么意思| 盐酸舍曲林片治疗什么程度的抑郁| 蛏子是什么| 胃气不通什么症状| 猴年马月什么意思| 将军是什么级别| 脂肪最怕什么| 很能睡觉是什么原因| 晚上经常做梦是什么原因| 一飞冲天是什么生肖| 准备好了吗时刻准备着是什么歌| 炖羊骨头放什么调料| 喝酒为什么会头疼| 脑梗适合吃什么水果| 四个火读什么| 荔枝什么品种好吃| ipa啤酒是指什么| 草木皆兵什么意思| 肝占位是什么意思| 疏是什么意思| 脚背浮肿是什么原因引起的| 睡觉起来口苦是什么原因| 卡西欧手表什么档次| 明月照沟渠是什么意思| 突厥是现在的什么地方| 不到长城非好汉的下一句是什么| 命里有时终须有命里无时莫强求什么意思| 什么发色显皮肤白| 儿童看牙齿挂什么科| a型血可以接受什么血型| 清华校长什么级别| 孕初期有什么症状| 心率慢吃什么药| 什么是扁平疣图片| feat什么意思| 什么像什么又像什么| 谪仙是什么意思| 沉香手串有什么好处| 舌吻是什么| 什么是大小周| 暇步士属于什么档次| 存款准备金率是什么意思| 减肥吃什么零食| 2003年五行属什么| 奶头疼是什么原因| 什么榴莲最好吃| 身体缺硒有什么症状| 吃什么最养胃修复胃| 出类拔萃什么意思| 什么情况下打破伤风| 96年什么命| 省检察长什么级别| 荨麻疹吃什么药最有效| 痛经 吃什么| 澳门车牌号是什么样子| 脑萎缩是什么原因引起的| 尿管型偏高是什么原因| 尿酸高会引发什么疾病| 一什么之什么成语| david是什么意思| 农历4月是什么星座| 结婚九年是什么婚| 什么叫情商高| 漏斗胸为什么长不胖| 费玉清为什么不结婚| 优生十项是检查什么| sey什么意思| 心肾不交失眠吃什么中成药| 胃溃疡吃什么水果好| cos是什么意思| 贝兄念什么| 社保跟医保有什么区别| 惘然什么意思| 舌头臭是什么原因| 梦见猪下崽预兆什么| 过敏吃什么药| 汉城为什么改名叫首尔| 大什么大| 脑供血不足挂什么科| 夏天流鼻血是什么原因| 头晕四肢无力是什么原因| 前列腺增生有什么症状| 梦见买猪肉是什么预兆| 正痛片别名叫什么| 姓陆的女孩取什么名字好| 萎缩性阴道炎用什么药| 黑眼袋是什么原因引起的| 百度Jump to content

顶嘴是什么意思

From Wikipedia, the free encyclopedia
百度 我手摸着35年前亲手雕刻的碑石,用蘸了清水的毛巾仔细地抹掉碑石上的灰尘。

IT disaster recovery (also, simply disaster recovery (DR)) is the process of maintaining or reestablishing vital infrastructure and systems following a natural or human-induced disaster, such as a storm or battle. DR employs policies, tools, and procedures with a focus on IT systems supporting critical business functions.[1] This involves keeping all essential aspects of a business functioning despite significant disruptive events; it can therefore be considered a subset of business continuity (BC).[2][3] DR assumes that the primary site is not immediately recoverable and restores data and services to a secondary site.

IT service continuity

[edit]

IT service continuity (ITSC) is a subset of BCP,[4] which relies on the metrics (frequently used as key risk indicators) of recovery point/time objectives. It encompasses IT disaster recovery planning and the wider IT resilience planning. It also incorporates IT infrastructure and services related to communications, such as telephony and data communications.[5][6]

Principles of backup sites

[edit]

Planning includes arranging for backup sites, whether they are "hot" (operating prior to a disaster), "warm" (ready to begin operating), or "cold" (requires substantial work to begin operating), and standby sites with hardware as needed for continuity.

In 2008, the British Standards Institution launched a specific standard supporting Business Continuity Standard BS 25999, titled BS25777, specifically to align computer continuity with business continuity. This was withdrawn following the publication in March 2011 of ISO/IEC 27301, "Security techniques — Guidelines for information and communication technology readiness for business continuity."[7]

ITIL has defined some of these terms.[8]

Recovery Time Objective

[edit]

The Recovery Time Objective (RTO)[9][10] is the targeted duration of time and a service level within which a business process must be restored after a disruption in order to avoid a break in business continuity.[11]

According to business continuity planning methodology, the RTO is established during the business impact analysis (BIA) by the owner(s) of the process, including identifying time frames for alternate or manual workarounds.

Example showing longer 'actual' times that do NOT meet either RPO or RTOs ('objectives'). Diagram provides schematic representation of the terms RPO and RTO.

RTO is a complement of RPO. The limits of acceptable or "tolerable" ITSC performance are measured by RTO and RPO in terms of time lost from normal business process functioning and data lost or not backed up during that period.[11][12]

Recovery Time Actual

[edit]

Recovery Time Actual (RTA) is the critical metric for business continuity and disaster recovery.[9]

The business continuity group conducts timed rehearsals (or actuals), during which RTA gets determined and refined as needed.[9]

Recovery Point Objective

[edit]

A Recovery Point Objective (RPO) is the maximum acceptable interval during which transactional data is lost from an IT service.[11]

For example, if RPO is measured in minutes, then in practice, off-site mirrored backups must be continuously maintained as a daily off-site backup will not suffice.[13]

Relationship to RTO

[edit]

A recovery that is not instantaneous restores transactional data over some interval without incurring significant risks or losses.[11]

RPO measures the maximum time in which recent data might have been permanently lost and not a direct measure of loss quantity. For instance, if the BC plan is to restore up to the last available backup, then the RPO is the interval between such backups.

RPO is not determined by the existing backup regime. Instead BIA determines RPO for each service. When off-site data is required, the period during which data might be lost may start when backups are prepared, not when the backups are secured off-site.[12]

Mean times

[edit]

The recovery metrics can be converted to/used alongside failure metrics. Common measurements include mean time between failures (MTBF), mean time to first failure (MTFF), mean time to repair (MTTR), and mean down time (MDT).

Data synchronization points

[edit]

A data synchronization point[14] is a backup is completed. It halts update processing while a disk-to-disk copy is completed. The backup[15] copy reflects the earlier version of the copy operation; not when the data is copied to tape or transmitted elsewhere.

System design

[edit]

RTO and the RPO must be balanced, taking business risk into account, along with other system design criteria.[16]

RPO is tied to the times backups are secured offsite. Sending synchronous copies to an offsite mirror allows for most unforeseen events. The use of physical transportation for tapes (or other transportable media) is common. Recovery can be activated at a predetermined site. Shared offsite space and hardware complete the package.[17]

For high volumes of high-value transaction data, hardware can be split across multiple sites.

History

[edit]

Planning for disaster recovery and information technology (IT) developed in the mid to late 1970s as computer center managers began to recognize the dependence of their organizations on their computer systems.

At that time, most systems were batch-oriented mainframes. An offsite mainframe could be loaded from backup tapes pending recovery of the primary site; downtime was relatively less critical.

The disaster recovery industry[18][19] developed to provide backup computer centers. Sungard Availability Services was one of the earliest such centers, located in Sri Lanka (1978).[20][21]

During the 1980s and 90s, computing grew exponentially, including internal corporate timesharing, online data entry and real-time processing. Availability of IT systems became more important.

Regulatory agencies became involved; availability objectives of 2, 3, 4 or 5 nines (99.999%) were often mandated, and high-availability solutions for hot-site facilities were sought.[citation needed]

IT service continuity became essential as part of Business Continuity Management (BCM) and Information Security Management (ICM) as specified in ISO/IEC 27001 and ISO 22301 respectively.

The rise of cloud computing since 2010 created new opportunities for system resiliency. Service providers absorbed the responsibility for maintaining high service levels, including availability and reliability. They offered highly resilient network designs. Recovery as a Service (RaaS) is widely available and promoted by the Cloud Security Alliance.[22]

Classification

[edit]

Disasters can be the result of three broad categories of threats and hazards.

  • Natural hazards include acts of nature such as floods, hurricanes, tornadoes, earthquakes, and epidemics.
  • Technological hazards include accidents or the failures of systems and structures such as pipeline explosions, transportation accidents, utility disruptions, dam failures, and accidental hazardous material releases.
  • Human-caused threats that include intentional acts such as active assailant attacks, chemical or biological attacks, cyber attacks against data or infrastructure, sabotage, and war.

Preparedness measures for all categories and types of disasters fall into the five mission areas of prevention, protection, mitigation, response, and recovery.[23]

Planning

[edit]

Research supports the idea that implementing a more holistic pre-disaster planning approach is more cost-effective. Every $1 spent on hazard mitigation (such as a disaster recovery plan) saves society $4 in response and recovery costs.[24]

2015 disaster recovery statistics suggest that downtime lasting for one hour can cost[25][failed verification]

  • small companies $8,000,
  • mid-size organizations $74,000, and
  • large enterprises $700,000 or more.

As IT systems have become increasingly critical to the smooth operation of a company, and arguably the economy as a whole, the importance of ensuring the continued operation of those systems, and their rapid recovery, has increased.[26]

Control measures

[edit]

Control measures are steps or mechanisms that can reduce or eliminate threats. The choice of mechanisms is reflected in a disaster recovery plan (DRP).

Control measures can be classified as controls aimed at preventing an event from occurring, controls aimed at detecting or discovering unwanted events, and controls aimed at correcting or restoring the system after a disaster or an event.

These controls are documented and exercised regularly using so-called "DR tests".

Strategies

[edit]

The disaster recovery strategy derives from the business continuity plan.[27] Metrics for business processes are then mapped to systems and infrastructure.[28] A cost-benefit analysis highlights which disaster recovery measures are appropriate. Different strategies make sense based on the cost of downtime compared to the cost of implementing a particular strategy.

Common strategies include:

  • backups to tape and sent off-site
  • backups to disk on-site (copied to off-site disk) or off-site
  • replication off-site, such that once the systems are restored or synchronized, possibly via storage area network technology
  • private cloud solutions that replicate metadata (VMs, templates and disks) into the private cloud. Metadata are configured as an XML representation called Open Virtualization Format, and can be easily restored
  • hybrid cloud solutions that replicate both on-site and to off-site data centers. This provides instant fail-over to on-site hardware or to cloud data centers.
  • high availability systems which keep both the data and system replicated off-site, enabling continuous access to systems and data, even after a disaster (often associated with cloud storage).[29]

Precautionary strategies may include:

  • local mirrors of systems and/or data and use of disk protection technology such as RAID
  • surge protectors — to minimize the effect of power surges on delicate electronic equipment
  • use of an uninterruptible power supply (UPS) and/or backup generator to keep systems going in the event of a power failure
  • fire prevention/mitigation systems such as alarms and fire extinguishers
  • anti-virus software and other security measures.

Disaster recovery as a service

[edit]
A modular data center connected to the power grid at a utility substation

Disaster recovery as a service (DRaaS) is an arrangement with a third party vendor to perform some or all DR functions for scenarios such as power outages, equipment failures, cyber attacks, and natural disasters.[30]


Disaster recovery for cloud systems

[edit]

Following best practices can enhance disaster recovery strategy for cloud-hosted systems: [31][32][33]

  1. Flexibility: The disaster recovery strategy should be adaptable to support both partial failures (such as recovering specific files) and full environment failures.
  2. Regular testing: Regular testing of the disaster recovery plan can verify its effectiveness and identify any weaknesses or gaps.
  3. Clear roles and permissions: It should be clearly defined who is authorized to execute the disaster recovery plan, with separate access and permissions for these individuals. Implementing a clear separation of permissions between those who can execute the recovery and those who have access to backup data helps minimize the risk of unauthorized actions.
  4. Documentation: The plan should be well-documented and easy-to-follow to ensure that operators can effectively follow it during stressful situations.

See also

[edit]

References

[edit]
  1. ^ "'Systems and Operations Continuity: Disaster Recovery". Georgetown University - University Information Services. Archived from the original on 26 Feb 2012. Retrieved 20 July 2024.
  2. ^ "Disaster Recovery and Business Continuity". IBM. Archived from the original on January 11, 2013. Retrieved 20 July 2024.
  3. ^ "What is Business Continuity Management?". Disaster Recovery Institute International. Retrieved 20 July 2024.
  4. ^ "Defending The Data Strata". ForbesMiddleEast.com. December 24, 2013.[permanent dead link]
  5. ^ M. Niemimaa; Steven Buchanan (March 2017). "Information systems continuity process". ACM.com (ACM Digital Library).
  6. ^ "2017 IT Service Continuity Directory" (PDF). Disaster Recovery Journal. Archived from the original (PDF) on 2025-08-05. Retrieved 2025-08-05.
  7. ^ "ISO 22301 to be published Mid May - BS 25999-2 to be withdrawn". Business Continuity Forum. 2025-08-05. Retrieved 2025-08-05.
  8. ^ "Browse the Resource Hub for all the latest content | Axelos". www.axelos.com.
  9. ^ a b c "Like The NFL Draft, Is The Clock The Enemy Of Your Recovery Time". Forbes. April 30, 2015.
  10. ^ "Three Reasons You Can't Meet Your Disaster Recovery Time". Forbes. October 10, 2013.
  11. ^ a b c d "Understanding RPO and RTO". DRUVA. 2008. Retrieved February 13, 2013.
  12. ^ a b "How to fit RPO and RTO into your backup and recovery plans". SearchStorage. Retrieved 2025-08-05.
  13. ^ Richard May. "Finding RPO and RTO". Archived from the original on 2025-08-05.
  14. ^ "Data transfer and synchronization between mobile systems". May 14, 2013.
  15. ^ "Amendment #5 to S-1". SEC.gov. real-time ... provide redundancy and back-up to ...
  16. ^ Peter H. Gregory (2025-08-05). "Setting the Maximum Tolerable Downtime -- setting recovery objectives". IT Disaster Recovery Planning For Dummies. Wiley. pp. 19–22. ISBN 978-1118050637.
  17. ^ William Caelli; Denis Longley (1989). Information Security for Managers. Springer. p. 177. ISBN 1349101370.
  18. ^ "Catastrophe? It Can't Possibly Happen Here". The New York Times. January 29, 1995. .. patient records
  19. ^ "Commercial Property/Disaster Recovery". The New York Times. October 9, 1994. ...the disaster-recovery industry has grown to
  20. ^ Charlie Taylor (June 30, 2015). "US tech firm Sungard announces 50 jobs for Dublin". The Irish Times. Sungard .. founded 1978
  21. ^ Cassandra Mascarenhas (November 12, 2010). "SunGard to be a vital presence in the banking industry". Wijeya Newspapers Ltd. SunGard ... Sri Lanka's future.
  22. ^ SecaaS Category 9 // BCDR Implementation Guidance CSA, retrieved 14 July 2014.
  23. ^ "Threat and Hazard Identification and Risk Assessment (THIRA) and Stakeholder Preparedness Review (SPR): Guide Comprehensive Preparedness Guide (CPG) 201, 3rd Edition" (PDF). US Department of Homeland Security. May 2018.
  24. ^ "Post-Disaster Recovery Planning Forum: How-To Guide, Prepared by Partnership for Disaster Resilience". University of Oregon's Community Service Center, (C) 2007, www.OregonShowcase.org. Retrieved October 29, 2018.[permanent dead link]
  25. ^ "The Importance of Disaster Recovery". Retrieved October 29, 2018.
  26. ^ "IT Disaster Recovery Plan". FEMA. 25 October 2012. Retrieved 11 May 2013.
  27. ^ "Use of the Professional Practices framework to develop, implement, maintain a business continuity program can reduce the likelihood of significant gaps". DRI International. 2025-08-05. Retrieved 2025-08-05.
  28. ^ Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, 2009. ISBN 978-0-07-148755-9. Page 480.
  29. ^ Brandon, John (23 June 2011). "How to Use the Cloud as a Disaster Recovery Strategy". Inc. Retrieved 11 May 2013.
  30. ^ "What Is Disaster Recovery as a Service (DRaaS)? | Definition from TechTarget". Disaster Recovery.
  31. ^ Engineering Resilient Systems on AWS. O'Reilly Media. 11 October 2024. ISBN 9781098162399.
  32. ^ Cloud Application Architectures Building Applications and Infrastructure in the Cloud. O'Reilly Media. April 2009. ISBN 9780596555481.
  33. ^ Site Reliability Engineering How Google Runs Production Systems. O'Reilly Media. 23 March 2016. ISBN 9781491951170.

Further reading

[edit]
[edit]
天秤座男生喜欢什么样的女生 几何图形是什么 木九十眼镜什么档次 膝盖内侧疼是什么原因 人为什么会困
洁身自爱是什么意思 春分是什么意思 眩晕症是什么原因引起 阴平阳秘是什么意思 湿疹为什么要查肝功能
耳鸣用什么滴耳液 包皮是什么 节瓜煲汤放什么材料 变化无常的意思是什么 什么叫做流年
黄豆什么时候播种 喝什么酒容易醉 8月6日什么星座 羊肉馅饺子放什么菜 1985年牛五行属什么
大理寺是什么机构hcv9jop1ns4r.cn 牛油果吃了有什么好处hcv9jop3ns5r.cn 老年人头晕挂什么科hcv9jop2ns9r.cn 避重就轻是什么意思hcv8jop5ns8r.cn 外阴苔癣是一种什么病hcv7jop6ns7r.cn
黑魔鬼烟为什么是禁烟hcv8jop0ns8r.cn 办身份证需要准备什么hcv7jop4ns5r.cn 为什么刚小便完又有尿意bfb118.com 欣喜若狂是什么意思hcv9jop4ns3r.cn 湿气太重吃什么药最好hcv9jop3ns0r.cn
晚上做噩梦是什么原因wuhaiwuya.com 怎么看自己五行属什么bysq.com 孤辰是什么意思hcv8jop6ns3r.cn 奥美拉唑和雷贝拉唑有什么区别520myf.com 一什么水壶hcv9jop6ns0r.cn
什么东西掉进水里不会湿hcv9jop5ns3r.cn 氨咖黄敏胶囊是什么药hcv8jop7ns6r.cn 低聚果糖是什么东西hcv9jop1ns7r.cn 使能是什么意思hcv8jop6ns2r.cn 鹅蛋炒什么好吃hcv8jop7ns1r.cn
百度 技术支持:克隆侠蜘蛛池 www.kelongchi.com