期刊文献+

信息系统灾难恢复的研究与实践 被引量:2

Study and Practices on Information System Disaster Recovery
下载PDF
导出
摘要 企业信息系统的灾难恢复是一项投资大、技术复杂的工程,需要在一套行之有效的方法论的指导下进行。通过对灾难恢复的原理分析,提出了以客户为中心的三角形体系框架。使用最优化理论对灾难恢复的策略进行了研究并在实际中得到应用。 An enterprise information system disaster recovery planning is a costly and complicated project and an effective methodology is very helpful for this work. This paper presents a customer centralization triangle system framework by studying principles of disaster recovery planning. In the paper, disaster recovery policy is studied by using optimization theory and this policy is used in a certain project.
作者 郝建明
出处 《航空计算技术》 2009年第3期83-86,共4页 Aeronautical Computing Technique
关键词 灾难恢复 信息安全 风险评估 disaster recovery information security risk assessment
  • 相关文献

参考文献8

  • 1IBM公司网站.灾难恢复解决方案[EB/OL].http://www-900.ibm.com/storage/cn/solutions/backup1.shtml,2008.02.
  • 2April Wells.系统灾难恢复:理论与实践[M].北京:清华大学出版社,2008:126-230.
  • 3裴尔明,刘宝旭.一种有效的风险评估模型、算法及流程[J].计算机工程,2006,32(23):15-17. 被引量:19
  • 4Othmar Kyas.网络安全技术--风险分析、策略和防火墙[M].北京:中国水利水电出版社,1998:93-140.
  • 5Petroski H.Technology and Architecture in an age of Terrorism[J].Technology in Society,2004,26(2):161-167.
  • 6Hayes P E.Hammons A.Disaster Recovery Project Management[A].Proceedings of IEEE 47th Petroleum and Chemical Industry Conference[C].USA:2000:55-63.
  • 7王琨,尹忠海,周利华,蔡震.信息系统灾难恢复计划研究[J].电子与信息学报,2007,29(4):776-780. 被引量:2
  • 8Lam W.Ensure Business Continuity[J].IT Professional,2002,4(3):19-25.

二级参考文献15

  • 1ISO/IEC 17799-2005.Information Technology-code of Practice for Information Security Management(Second Edition)[S].2005-06-15.
  • 2ISO/IEC 13335-1/2/3/4/5/-1999~2001.Information Technology-security Techniques-guidelines for the Management of IT Security[S].1996~2001.
  • 3Stoneburner G,Goguen A,Feringa A.Risk Management Guide for Information Technology Systems[EB/OL].2002.http://www.csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
  • 4Alberts C J,Behrens S G,Pethia R D,et al.Operationally Critical Threat,Asset and Vulnerability EvaluationSM[EB/OL].2004-10-20.http://www.cert.org/octave/.
  • 5Petroski H.Technology and architecture in an age of terrorism[J].Technology in Society,2004,26(2-3):161-167.
  • 6Anon.Blackouts.Threat of terrorism spur disaster recovery planning[J].International Journal of Micrographics and Optical Technology,2003,21(4-5):2-2.
  • 7Wang K,Su R D,and Li Z X,et al..Robust disaster recovery system model[J].Wuhan University Journal of Natural Sciences,2006,11(1):170-174.
  • 8Chow W S.Success factors for IS disaster recovery planning in Hong Kong[J].Information Management and Computer Security,2000,8(2):80-86.
  • 9Smith D R,Cybrowski W J,and Zawislan F,et al..Contingency/disaster recovery planning for transmission systems of the defense information system networks[J].IEEE Journal on Selected Areas in Communications,1994,12(1):13-22.
  • 10Hayes P E and Hammons A.Disaster recovery project management[C].Proceedings of IEEE 47th Petroleum and Chemical Industry Conference,San Antonio,TX,USA,2000:55-63.

共引文献19

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部