Week 9 Discussion
Week 9 Discussion
Week 9 Discussion
Disaster recovery for cloud service providers refers to the procedures and safeguards set up by
cloud service providers to guarantee the availability and restoration of the data, programs, and
services of their clients in the case of a catastrophe or other disruptive event. (Techtarget, n.d)
Cloud providers employ various strategies to protect against potential disasters, including natural
Key components of disaster recovery for cloud providers include robust backup and replication
mechanisms. (Infoworld, n.d) Providers regularly create backups of customer data and
infrastructure, storing them in multiple geographically diverse locations. (Infoworld, n.d) They
also conduct regular testing and rehearsals of their disaster recovery plans to validate their
Business continuity for cloud providers ensures uninterrupted operation and availability of
critical business processes and services. (Linkedin, n.d) This entails backup systems, redundant
data centers, routine testing, SLAs, and incident response teams. Infrastructure with redundancy
reduces disruptions, and backups and data replication allow for quick recovery. Frequent
exercises and testing confirm readiness and highlight opportunities for development. SLAs
frequently include promises about response times, recovery goals, and compensation in the event
of service interruptions. Customers are given assurance and responsibility on the part of the
cloud provider thanks to these agreements. All of these precautions guarantee unbroken
operations, data security, and prompt restoration in the event of emergencies or disruptions.
Disgruntled employees pose significant threats to organizations due to their insider knowledge,
access privileges, and negative motivations. (Cisa, n.d) These dangers can take many different
2
forms, including data theft, sabotage, unauthorized access, insider trading, reputational damage,
etc. (Cisa, n.d) Organizations should adopt strong security measures and procedures, including as
access limits, staff monitoring systems, and incident response plans, to reduce the risk posed by
these attacks. (Cisa, n.d) Frequent security awareness training, efficient communication lines,
and a positive workplace culture can all aid in spotting and resolving employee complaints
before they become more serious. (Cisa, n.d) Strong exit policies are also established to ensure
that access credentials are swiftly withdrawn and company assets are recovered when employees
One real-world example of an organization put at risk by a disgruntled employee is the case of
Edward Snowden and the National Security Agency (NSA) in 2013. ( The Guardian, n.d)
Edward Snowden, a former NSA contractor, leaked classified documents to the media, revealing
extensive surveillance programs conducted by the agency. ( The Guardian, n.d) Snowden's
actions exposed the NSA's mass surveillance activities, including the collection of phone records
and internet communications of both U.S. citizens and individuals worldwide.( The Guardian,
n.d)
References
https://www.techtarget.com/searchdisasterrecovery/definition/disaster-recovery
2. (Infoworld, n.d). Disaster recovery in the cloud. Retrieved July 6, 2023, from
https://www.infoworld.com/article/3697734/disaster-recovery-in-the-cloud.html
3
3. (Linkedin, n.d). The Continuing Importance of Business Continuity Planning in the Age of
importance-business-continuity-planning-age-cloud/
4. ( The Guardian, n.d). Edward Snowden: The whistleblower behind the NSA surveillance
https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-
surveillance
5. (Cisa, n.d). Insider Threat Mitigation Guide. Retrieved July 6, 2023, from
https://www.cisa.gov/sites/default/files/2022-11/Insider%20Threat%20Mitigation
%20Guide_Final_508.pdf