|R - Recovery Point Objective, Recovery Time Objective, Risk Assessment, Risk Control Option||
Deprecated: Non-static method JHTML::_() should not be called statically, assuming $this from incompatible context in /home/sentryx4/public_html/components/com_content/views/article/tmpl/default.php on line 49
Deprecated: Non-static method JPath::find() should not be called statically, assuming $this from incompatible context in /home/sentryx4/public_html/libraries/joomla/html/html.php on line 66
Deprecated: Non-static method JHTML::addIncludePath() should not be called statically, assuming $this from incompatible context in /home/sentryx4/public_html/libraries/joomla/html/html.php on line 66
Areas of business with critical resources that need to be recovered in the event of a business disruption. Typical recovery areas include IT systems and infrastructure, manufacturing and production, work areas, and critical data and critical/vital records.
An alternative option for recovering disrupted critical resources. For example, a cold site, warm site, and hot site are three options for recovering IT systems and infrastructure.
Recovery point objective (RPO)
Refers to the tolerance for the loss of data measured in terms of the time between the last backup of data and the disaster event. RPO is an indicator of how much lost data can be recovered once systems are recovered and updated with the last backup of data.
Sequence for recovering critical business processes.
Recovery time objective (RTO)
Length of time available for recovering disrupted systems and resources.
Recovery time requirements
Time frames that collectively represent the requirements to recover from a disruption, such as Maximum Tolerable Downtime (MTD), Recovery Time Objective (RTO), Recovery Point Objective (RPO), and Work Recovery Time (WRT).
Process that is used to scan and transmit check images and data electronically.
One of the backup methods wherein the data is mirrored at a alternate recovery facility to provide continuous availability using technology such as transaction routers, and proprietary fault tolerant redundant systems.
Are characterized as a list of IT and non-IT resources required by a critical process to perform its normal operation.
A chance or likelihood of a threat source causing an event with adverse business impacts.
Risk control option which accepts the risk of a threat as tolerable and does not require additional steps to reduce or eliminate the risk.
Risk assessment is a process that begins with the identification of potential threats to an organization and ends with a set of risk values for those threats.
Risk control option which avoids the risk altogether.
Risk control option
Options for controlling the risks of threats. Risk control options can be divided into four areas: risk acceptance, risk avoidance, risk reduction, and risk transfer.
Risk control option which reduces the risk to an acceptable level.
Risk control option which transfers the risk to another entity or organization (e.g. an insurance company).
The process of identifying that all employees, visitors and contractors have been safely evacuated and accounted for following an evacuation of a building or site.