With the increasing importance of data security, the adoption of data synchronization technology to realize disaster recovery backup of the database is an important measure to ensure data security. Oracle, as the main...With the increasing importance of data security, the adoption of data synchronization technology to realize disaster recovery backup of the database is an important measure to ensure data security. Oracle, as the main database used at present, provides data synchronization mechanisms such as DataGuard and GoldenGate. This paper analyzes and compares these data synchronization technologies, and puts forward a scheme combining DataGuard and GoldenGate to realize disaster recovery of information system data. It also meets the needs of data sharing, read-write separation and so on.展开更多
Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a fir...Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a firm must be able to recover from both man-made and natural disasters. This is especially true for maintaining and recovering the lifeline of the organization and its data. Although the literature has discussed the importance of disaster recovery and business continuity, there is not much known about how Information System Data Analytics Resilience (ISDAR) and the organization’s ability to recover from lost information. In this research, we take a step in this direction and analyze the relationship of IS personnel expertise on ISDAR and investigate Information System (IS) personnel understanding of the firm’s competitive priorities, IS Personnel understanding of business policies and objectives, IS personnel’s ability to solve business problems, IS personnel initiatives in changing business processes and their determination and attentiveness to focus on achieving confident leadership in data and analytics resilience. We collected data through a survey of IS and business managers from 302 participants. Our results show that there is evidence to support our hypothesis and that there may indeed be a relationship between these variables.展开更多
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante...Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.展开更多
目的:为解决医院信息系统异地容灾备份问题,提出方案。方法:通过Oracle Data Guard,采用最大性能模式,构建容灾备份系统。结果:实践表明,创建的物理备用数据库能满足系统设计要求。结论:通过对比常用的容灾备份方案,表明采用Oracle Data...目的:为解决医院信息系统异地容灾备份问题,提出方案。方法:通过Oracle Data Guard,采用最大性能模式,构建容灾备份系统。结果:实践表明,创建的物理备用数据库能满足系统设计要求。结论:通过对比常用的容灾备份方案,表明采用Oracle Data Guard技术实现数据备份在资金、性能上的优越性。展开更多
为了解决数据丢失或损毁,经过对容灾技术的研究,提出基于Oracle Data Guard容灾技术的解决方案,介绍Data Guard容灾技术的工作原理和相关特性,并实现物理备份数据库的构建和角色切换。结果表明,该方案能有效地解决Oracle数据库的数据丢...为了解决数据丢失或损毁,经过对容灾技术的研究,提出基于Oracle Data Guard容灾技术的解决方案,介绍Data Guard容灾技术的工作原理和相关特性,并实现物理备份数据库的构建和角色切换。结果表明,该方案能有效地解决Oracle数据库的数据丢失或损毁问题,为数据的保护提供更有效的保障。展开更多
汇文文献信息服务系统是图书馆工作的命脉,其数据的安全性至关重要,Oracle Data Guard为此提供了最佳的数据保护和数据可用性解决方案。通过在汇文文献信息服务系统中建立Oracle Data guard环境的方法,对主数据库进行容灾备份,能够有效...汇文文献信息服务系统是图书馆工作的命脉,其数据的安全性至关重要,Oracle Data Guard为此提供了最佳的数据保护和数据可用性解决方案。通过在汇文文献信息服务系统中建立Oracle Data guard环境的方法,对主数据库进行容灾备份,能够有效保障数据的安全性和可用性。展开更多
随着工业数字化转型的深入,数据安全和业务连续性成为企业关注的焦点。本文旨在探讨工业数据安全的现状、面临的威胁以及满足等保2.0(网络安全等级保护2.0)背景下康吉森Uni-BRS(智能灾备系统)有效应对策略及解决方案。本文通过分析Uni-...随着工业数字化转型的深入,数据安全和业务连续性成为企业关注的焦点。本文旨在探讨工业数据安全的现状、面临的威胁以及满足等保2.0(网络安全等级保护2.0)背景下康吉森Uni-BRS(智能灾备系统)有效应对策略及解决方案。本文通过分析Uni-BRS的应用案例,展示了如何通过先进的技术手段提高数据保护质量和业务连续性管理。研究发现,Uni-BRS通过全场景应用级灾备、微秒级CDP(Continuous Data Protection,数据连续性保护)、自动化验证告警等功能,有效应对了备份环境复杂多样、数据验证难、应急容灾挑战大和重建恢复难度高等挑战。本文建议企业应重视灾备系统的建设,以确保数据安全和业务连续性。展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
文摘With the increasing importance of data security, the adoption of data synchronization technology to realize disaster recovery backup of the database is an important measure to ensure data security. Oracle, as the main database used at present, provides data synchronization mechanisms such as DataGuard and GoldenGate. This paper analyzes and compares these data synchronization technologies, and puts forward a scheme combining DataGuard and GoldenGate to realize disaster recovery of information system data. It also meets the needs of data sharing, read-write separation and so on.
文摘Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a firm must be able to recover from both man-made and natural disasters. This is especially true for maintaining and recovering the lifeline of the organization and its data. Although the literature has discussed the importance of disaster recovery and business continuity, there is not much known about how Information System Data Analytics Resilience (ISDAR) and the organization’s ability to recover from lost information. In this research, we take a step in this direction and analyze the relationship of IS personnel expertise on ISDAR and investigate Information System (IS) personnel understanding of the firm’s competitive priorities, IS Personnel understanding of business policies and objectives, IS personnel’s ability to solve business problems, IS personnel initiatives in changing business processes and their determination and attentiveness to focus on achieving confident leadership in data and analytics resilience. We collected data through a survey of IS and business managers from 302 participants. Our results show that there is evidence to support our hypothesis and that there may indeed be a relationship between these variables.
基金Supported by the 10th Five Year High-Tech Researchand Development Plan of China (2002AA1Z67101)
文摘Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.
文摘目的:为解决医院信息系统异地容灾备份问题,提出方案。方法:通过Oracle Data Guard,采用最大性能模式,构建容灾备份系统。结果:实践表明,创建的物理备用数据库能满足系统设计要求。结论:通过对比常用的容灾备份方案,表明采用Oracle Data Guard技术实现数据备份在资金、性能上的优越性。
文摘为了解决数据丢失或损毁,经过对容灾技术的研究,提出基于Oracle Data Guard容灾技术的解决方案,介绍Data Guard容灾技术的工作原理和相关特性,并实现物理备份数据库的构建和角色切换。结果表明,该方案能有效地解决Oracle数据库的数据丢失或损毁问题,为数据的保护提供更有效的保障。
文摘随着工业数字化转型的深入,数据安全和业务连续性成为企业关注的焦点。本文旨在探讨工业数据安全的现状、面临的威胁以及满足等保2.0(网络安全等级保护2.0)背景下康吉森Uni-BRS(智能灾备系统)有效应对策略及解决方案。本文通过分析Uni-BRS的应用案例,展示了如何通过先进的技术手段提高数据保护质量和业务连续性管理。研究发现,Uni-BRS通过全场景应用级灾备、微秒级CDP(Continuous Data Protection,数据连续性保护)、自动化验证告警等功能,有效应对了备份环境复杂多样、数据验证难、应急容灾挑战大和重建恢复难度高等挑战。本文建议企业应重视灾备系统的建设,以确保数据安全和业务连续性。
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.