Understanding the Threats
An IT staff must anticipate and prepare for a wide range of system threats. The following sections examine common threats, how IT teams traditionally tried to mitigate threat risks, and how cloud-based solutions may further mitigate risks. It is very difficult, if not impossible, to restore a business to 100 percent following a disaster. Businesses, as such, will define a recovery point objective (RPO) that specifies the level to which data must be restored and a recovery time objective (RTO) that specifies the maximum downtime that can occur before the company must resume operations.
One of the first steps to develop a disaster-recovery plan is to identify the assets (people, processes, and things) that you want to ...
Get Cloud Computing, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.