期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
1
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH disaster recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain Proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
Robust Disaster Recovery System Model 被引量:2
2
作者 WANG Kun SU Rui-dan +2 位作者 LI Zeng-xin CAI Zhen ZHOU Li-hua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第1期170-174,共5页
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante... Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support. 展开更多
关键词 continuous service E-GOVERNMENT information security disaster recovery high availability risk assessment data backup
下载PDF
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities 被引量:1
3
作者 Man Liu Lei Yu 《Intelligent Information Management》 2022年第2期71-79,共9页
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm... Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities. 展开更多
关键词 Oracle Database Security Protection Database Backup disaster recovery Colleges and Universities
下载PDF
ZTE to Provide Disaster Recovery Solution to U Mobile Malaysia
4
作者 ZTE Corporation 《ZTE Communications》 2013年第3期32-32,共1页
4 October 2013, Shenzhen-ZTE has been selected by U Mobile Sdn Bhd to provide a disaster recovery system to make Malaysia's most dynamic and innovative 3G mobile network more resilient and robust. U Mobile will depl... 4 October 2013, Shenzhen-ZTE has been selected by U Mobile Sdn Bhd to provide a disaster recovery system to make Malaysia's most dynamic and innovative 3G mobile network more resilient and robust. U Mobile will deploy ZTE's DR solution in the core network, increasing the backup capabilities of the network infrastructure. The agreement between U Mobile and ZTE was signed today in Kuala Lumpur. ZTE's DR solution will be implemented on U Mobile's core transmission and IPCORE equipment and will significantly reduce service recovery times and improve network stability and reliability. 展开更多
关键词 ZTE to Provide disaster recovery Solution to U Mobile Malaysia WILL
下载PDF
Promoting Older Adults' Engagement in Disaster Recovery Through Supportive Relationships, Partnerships, and Collaboration: Perspectives of Social Work Practitioners and Human Service Professionals 被引量:1
5
作者 Julie L.Drolet Mahed Choudhury 《International Journal of Disaster Risk Science》 SCIE CSCD 2024年第2期265-276,共12页
Shifting demographics—that is, the growing number of older adults in Canada and internationally—and intersecting climatic risks create a complex landscape of aging in place in disaster contexts. Some older adults ar... Shifting demographics—that is, the growing number of older adults in Canada and internationally—and intersecting climatic risks create a complex landscape of aging in place in disaster contexts. Some older adults are vulnerable due to their underlying health conditions and limited physical mobility. Yet they also exhibit resilience in a distinct manner, owing to their wealth of knowledge, wisdom, and ability to navigate adversities. This article elucidates potential avenues for promoting the involvement of older adults in disaster recovery efforts. Our intention is to recognize and foster older adult resilience and mitigate vulnerability by drawing upon insights from the study titled “In the Aftermath of the 2016 Alberta Wildfires: The Role of Social Work Practitioners and Human Service Professionals in Long-Term Disaster Recovery.” Employing a qualitative research approach, that study recruited 51 participants for semistructured interviews and focus groups. A thematic analysis of the collected data unveiled the pivotal roles played by social workers and human service practitioners in facilitating recovery from the 2016 wildfires in the research. Notably, three overarching themes emerged concerning the promotion of older adults' involvement in disaster recovery: fostering supportive relationships, building partnerships and enhancing collaboration, and addressing ongoing challenges. These findings offer valuable insights into how social work practitioners and human service professionals can effectively facilitate the engagement of older adults in disaster recovery initiatives. This article emphasizes the significance of actively promoting the participation of older adults in disaster mitigation efforts, thereby fostering greater resilience within communities. 展开更多
关键词 Alberta wildfires CANADA disaster recovery Older adults Partnerships and collaboration Social work
原文传递
DR-Cloud: Multi-Cloud Based Disaster Recovery Service 被引量:5
6
作者 Yu Gu Dongsheng Wang Chuanyi Liu 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期13-23,共11页
With the rapid popularity of cloud computing paradigm, disaster recovery using cloud resources becomes an attractive approach. This paper presents a practical multi-cloud based disaster recovery service model: DR- Cl... With the rapid popularity of cloud computing paradigm, disaster recovery using cloud resources becomes an attractive approach. This paper presents a practical multi-cloud based disaster recovery service model: DR- Cloud. With DR-Cloud, resources of multiple cloud service providers can be utilized cooperatively by the disaster recovery service provider. A simple and unified interface is exposed to the customers of DR-Cloud to adapt the heterogeneity of cloud service providers involved in the disaster recovery service, and the internal processes between clouds are invisible to the customers. DR-Cloud proposes multiple optimization scheduling strategies to balance the disaster recovery objectives, such as high data reliability, low backup cost, and short recovery time, which are also transparent to the customers. Different data scheduling strategies based on DR-Cloud are suitable for different kinds of data disaster recovery scenarios. Experimental results show that the DR-Cloud model can cooperate with cloud service providers with various parameters effectively, while its data scheduling strategies can achieve their optimization objectives efficiently and are widely applicable. 展开更多
关键词 multi-cloud disaster recovery DR-Cloud
原文传递
Disaster Recovery and Reconstruction Following the 2011 Great East Japan Earthquake and Tsunami: A Business Process Management Perspective 被引量:5
7
作者 Natt Leelawat Anawat Suppasri Fumihiko Imamura 《International Journal of Disaster Risk Science》 SCIE CSCD 2015年第3期310-314,共5页
The Tohoku Regional Bureau(TRB) of the Ministry of Land, Infrastructure, Transport and Tourism(MLIT) performed various actions in response to the 2011 Great East Japan Earthquake and Tsunami. The total disaster recove... The Tohoku Regional Bureau(TRB) of the Ministry of Land, Infrastructure, Transport and Tourism(MLIT) performed various actions in response to the 2011 Great East Japan Earthquake and Tsunami. The total disaster recovery and reconstruction period is expected to last for 10 years, of which the first five years are regarded as the concentrated reconstruction period. As of 2013, a majority of the mega projects that involved restoration actions have been completed, which indicates a more effective rate of completion compared with the MLIT projects performed in normal non-disaster situations. This short article explains the management process of the recovery and reconstruction utilized by the TRB—an interorganizational process—from a business process management(BPM) perspective and creates a simple organization construction diagram of the entire process. The study focused on the transactions and actor roles to identify their strengths. The findings indicate the utilization of different operational procedures in some parts of the process, the importance of liaison role, as well as some obstacles. The lessons learned from this analysis can assist managers and researchers in designing and managing restoration processes for future disasters. 展开更多
关键词 Business process management disaster reconstruction disaster recovery 2011 Great East Japan Earthquake and Tsunami
原文传递
Structure-independent disaster recovery:Concept,architecture and implementations 被引量:3
8
作者 ZHENG WeiMin FANG BinXing 《Science in China(Series F)》 2009年第5期813-823,共11页
Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods ... Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods are structure-dependent. It is hard to share the DR resources between different DR systems, which made it expensive. We present a structure-independent disaster recovery theory and its implementation methods in this paper. By backup the whole system but not just the data, the goal of device and application-independent disaster recovery has been achieved. We further present a parallel recovery model and an on demand data retrieval method based on the theory. Some implementation details of prototype recovery system are also discussed. With the methods independent from specific devices or applications, the cost of disaster recovery infrastructure can be essentially reduced by resource sharing. Experiments show that the recovery time has also been greatly shortened with little service degradation. 展开更多
关键词 disaster recovery PARALLEL VIRTUALIZATION
原文传递
Cyberattack Ramifications, The Hidden Cost of a Security Breach
9
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name disaster recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection recovery Point Objective (RPO) recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
Survivability evaluation for networks carrying complex traffic flows
10
作者 Amin Jamali Mehdi Berenjkoub +1 位作者 Hossein Saidi Behrouz Shahgholi Ghahfarokhi 《Digital Communications and Networks》 SCIE CSCD 2023年第2期534-544,共11页
The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of survivability.In this paper,we propose a model for survivability qua... The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of survivability.In this paper,we propose a model for survivability quantification,which is acceptable for networks carrying complex traffic flows.Complex network traffic is considered as general multi-rate,heterogeneous traffic,where the individual bandwidth demands may aggregate in complex,nonlinear ways.Blocking probability is the chosen measure for survivability analysis.We study an arbitrary topology and some other known topologies for the network.Independent and dependent failure scenarios as well as deterministic and random traffic models are investigated.Finally,we provide survivability evaluation results for different network configurations.The results show that by using about 50%of the link capacity in networks with a relatively high number of links,the blocking probability remains near zero in the case of a limited number of failures. 展开更多
关键词 Blocking probability Complex traffic Link failure Network survivability disaster recovery Information assurance
下载PDF
Design of Enterprise Storage Architecture for Optimal Business Continuity
11
作者 Rekha Singhal Prasad Pawar +2 位作者 Shreya Bokare Rashmi Kale Yogendra Pal 《Journal of Electronic Science and Technology》 CAS 2010年第3期206-214,共9页
This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol s... This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol storage area network (IPSAN), which is used for data management without burdening the application server, as well as mix of synchronous and semi-synchronous replication techniques to replicate data to remote disaster recovery site. We have presented the detailed design of both synchronous and semi-synchronous with case study of using open source database postgres to prove our point for optimal business continuity. The theoretical presentation is also given for the same. 展开更多
关键词 Business continuity disaster recovery Internet protocol storage area network (IPSAN) semi-synchronous replication synchronous replication.
下载PDF
Qpening of International Conference on Seismic Resistance Achievements of Tangshan Recovery and Reconstruction Resistance and Disaster Prevention Technology The 12th National Meeting of Seismic Resistance
12
《Natural Disaster Reduction in China》 1997年第1期38-39,共2页
关键词 Qpening of International Conference on Seismic Resistance Achievements of Tangshan recovery and Reconstruction Resistance and disaster Prevention Technology The 12th National Meeting of Seismic Resistance
原文传递
Fuzzy Boundaries Between Post-Disaster Phases: The Case of L'Aquila, Italy 被引量:1
13
作者 Diana Contreras 《International Journal of Disaster Risk Science》 SCIE CSCD 2016年第3期277-292,共16页
A number of indices have been developed for measuring vulnerability to disasters, but little attention has been paid to recovery indices. Post-disaster periods are usually divided into four phases. The terms establish... A number of indices have been developed for measuring vulnerability to disasters, but little attention has been paid to recovery indices. Post-disaster periods are usually divided into four phases. The terms established by the United Nations Development Programme for post-disaster phases—relief, early recovery, recovery, and development—are used in this article. This research examines the hypothesis that the boundaries between post-disaster recovery phases are fuzzy and should be defined by the progress achieved in the recovery process, rather than by the amount of time elapsed since the event. The methodology employed involved four steps: fieldwork, mapping,identification of indicators, and assessment. The case study area was the city of L'Aquila in the Abruzzo region of central Italy, which was struck by an earthquake in April2009. For each phase of the recovery process in L'Aquila a score was calculated based on the progress observed in2016, 7 years after the earthquake. The highest score went to the early recovery phase(14 points), followed by the recovery phase(13 points), the development phase(12points), and the relief phase(4 points). The results demonstrate the possibility of defining post-disaster recovery phases in an affected area based on measuring achievements through indicators rather than defining recovery phases in terms of elapsed time after a disaster. 展开更多
关键词 disaster recovery EARTHQUAKES Geographical information system (GIS) L’Aquila Post-disaster phases Spatial indicators
原文传递
The Sendai Framework for Disaster Risk Reduction at Five:Lessons from the 2011 Great East Japan Earthquake and Tsunami
14
作者 Elizabeth Maly Anawat Suppasri 《International Journal of Disaster Risk Science》 SCIE CSCD 2020年第2期167-178,共12页
The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) represents an inclusive approach to disaster risk reduction, linked to development and recovery. Building on previous international guidelines, the SF... The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) represents an inclusive approach to disaster risk reduction, linked to development and recovery. Building on previous international guidelines, the SFDRR promotes practical and measurable outcomes for reducing disaster losses, including indicators to measure progress towards seven specific global targets.Evaluated in the context of the priorities and global targets of the SFDRR, the article considers the case of the Great East Japan Earthquake and Tsunami of 2011 to illustrate advances and limitations in pre-disaster tsunami hazard engineering and post-disaster recovery. With respect to the targets set out in the Sendai Framework related to risk reduction and tsunami engineering, especially Priority 1,understanding disaster risk, there have been significant advances in hazard assessment and systems for tsunami detection and warning. Although the SFDRR emphasizes actions in the recovery phase through Priority 4, enhancing disaster preparedness with an emphasis on the concept of build back better, on its own this does not function as a clear directive for guiding recovery. However, the overall people-centered and inclusive approach of the SFDRR, as well as the global targets and several sub-priorities, can be a useful way to shape good practices in recovery and evaluate recovery progress. 展开更多
关键词 Build back better disaster recovery Great East Japan Earthquake Sendai Framework Tsunami risk
原文传递
Road to Resettlement:Understanding Post‑disaster Relocation and Resettlement Challenges and Complexities Through a Serious Game
15
作者 Ali Asgary Peyman Naeemi +3 位作者 Nilanjana Ganguli Mohammadali Tofighi Koorosh Attarian Tabata Fioretto 《International Journal of Disaster Risk Science》 SCIE 2024年第4期521-535,共15页
Resettlement and relocation are among the most difficult policies to put into practice, but they may be the best ways to minimize future risks to settlements exposed to natural hazards both before and after disaster e... Resettlement and relocation are among the most difficult policies to put into practice, but they may be the best ways to minimize future risks to settlements exposed to natural hazards both before and after disaster events. As climate-related disasters and forced migration become increasingly common worldwide, governments, humanitarian or development actors,and policymakers must now prioritize the implementation of a dignified and effective resettlement program as part of their planning and management responsibilities. Much of this effectiveness depends on the stakeholders and beneficiaries' understanding and knowledge of the different resettlement phases, culture and customs of affected populations, activities, and the associated implementation challenges, costs, and benefits. Serious games are used in a variety of contexts to increase awareness, train and build capacity in stakeholders and beneficiaries. This article presents a serious game developed to educate practitioners, local agencies, students, and the public to understand the complexities and challenges involved in a successful resettlement. The game is based on a real proposed resettlement project initiated in the Chiradzulu District in southern Malawi after Cyclone Freddy in March 2023, which caused widespread flooding and landslides, forcing some villages to relocate permanently. The progression in the Road to Resettlement Game consists of six primary levels: land and site preparation, housing and livelihood, water, sanitation, and hygiene, health, education, and protection. These levels are meant to be completed in a sequence that adheres to the principles of resettlement. By engaging in the serious table-top board game, players gain an understanding of the resettlement activities, their sequence, and the associated practical(technical and social) and financial challenges. 展开更多
关键词 Cyclone freddy Displacement Malawi Post disaster recovery Resettlement Serious game
原文传递
Distributed Storage Cluster Design for Remote Mirroring Based on Storage Area Network 被引量:1
16
作者 姚骏 舒继武 郑纬民 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第4期521-526,共6页
With the explosion of information nowadays, applying data storage safety requirements has become a new challenge, especially in high data available cluster environments. With the emergence of Storage Area Networks (S... With the explosion of information nowadays, applying data storage safety requirements has become a new challenge, especially in high data available cluster environments. With the emergence of Storage Area Networks (SANs), storage can be network-based and consolidated, and mass data movements via Fiber Channels (FCs) can be of very high speed. Based on these features, this paper introduces a dual-node storage cluster designed for remote mirroring as a concurrent data replication method to protect data during system failures. This design takes full advantage of a SAN system's benefits, and it adopts a synchronous protocol to guarantee a fully up-to-date data copy on the remote site. By developing a Linux kernel module to control the I/O flow and by using the technologies of software Logic Unit Number (LUN) masking, background online resynchronization and a self-management daemon, we have achieved a reliable mirroring system with the characteristics of server-free data replication, fault tolerance, online disaster recovery and high performance. In this study, we implemented the design in a remote mirror subsystem built on a software Fiber Channel Storage Area Network (FC-SAN) system. 展开更多
关键词 remote mirror SAN (storage area network) server free fault tolerance online disaster recovery
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部