Wang Kun, Yin Zhong-hai, Zhou Li-hua, Cai Zhen. Study on Information System Disaster Recovery Planning[J]. Journal of Electronics & Information Technology, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684
Citation:
Wang Kun, Yin Zhong-hai, Zhou Li-hua, Cai Zhen. Study on Information System Disaster Recovery Planning[J]. Journal of Electronics & Information Technology, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684
Wang Kun, Yin Zhong-hai, Zhou Li-hua, Cai Zhen. Study on Information System Disaster Recovery Planning[J]. Journal of Electronics & Information Technology, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684
Citation:
Wang Kun, Yin Zhong-hai, Zhou Li-hua, Cai Zhen. Study on Information System Disaster Recovery Planning[J]. Journal of Electronics & Information Technology, 2007, 29(4): 776-780. doi: 10.3724/SP.J.1146.2005.01684
When disaster happens, it is necessary use quantitive and accurate method to select the best set from many sub disaster recovery plans to control the disaster recovery activities. This paper presents a practicable mathematical model using optimization theory. The model contains some parameters that stand for different applications, facilities, resources, sub plans, budget, etc. The model classifies resources and solves the conflicts among various sub disaster recovery plans. With less subjective parameter, the model can evaluate DRP more impersonally. The model possesses less parameter and can be easily implemented to analyze DRP accurately and quantitatively. The implementation and the analysis of the model are presented. Test also verifies the correctness of this model.
[1] Petroski H. Technology and architecture in an age of terrorism[J].Technology in Society.2004, 26(2-3):161-167 [2] Anon. Blackouts. Threat of terrorism spur disaster recovery planning[J]. International Journal of Micrographics and Optical Technology, 2003, 21(4-5): 2-2. [3] Wang K, Su R D, and Li Z X, et al.. Robust disaster recovery system model[J].Wuhan University Journal of Natural Sciences.2006, 11(1):170-174 [4] Chow W S. Success factors for IS disaster recovery planning in Hong Kong[J].Information Management and Computer Security.2000, 8(2):80-86 [5] Smith D R, Cybrowski W J, and Zawislan F, et al.. Contingency/disaster recovery planning for transmission systems of the defense information system networks[J].IEEE Journal on Selected Areas in Communications.1994, 12(1):13-22 [6] Hayes P E and Hammons A. Disaster recovery project management[C]. Proceedings of IEEE 47th Petroleum and Chemical Industry Conference, San Antonio, TX, USA, 2000: 55-63. [7] Lam W. Ensuring business continuity[J]. IT Professional, 2002, 4(3): 19-25. [8] Uddin N and Engi D. Disaster management system for southwestern Indiana[J].Natural Hazards Review.2002, 3(1):19-30 [9] Fallara P. Disaster recovery planning[J]. IEEE Potentials, 2004, 22(5): 42-44. [10] Hawkins S M, Yen D C, and Chou D C. Disaster recovery planning: A strategy for data security[J].Information Management and Computer Security.2000, 8(5):222-229 [11] Corley J and Lejerskar D. Homeland defense center network-capitalizing on simulation modeling and visualization for emergency preparedness response and mitigation[C]. Proceedings of the 2003 Winter Simulation Conference: Driving Innovation, Piscataway, NJ, USA, 2003: 1061-1067.