Course Hero Logo

File sync and share also improves employee

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 573 - 576 out of 610 pages.

File sync-and-share also improves employee productivity by allowing the usersto access data from any device, anywhere, at any time.
© Copyright 2021 Dell Inc.AppendixData Protection and Management-SSPPage 566Cloud-based Mobile Device Data ProtectionCopies the data over the Internet to a shared storage infrastructure in a cloud,maintained by a service provider. Cloud-based backup is one of the key dataprotection mechanisms for protecting mobile device data.Typically use a backup client application (agent) that is installed on the device toaccess and back up data to the cloud. These agents typically scan the mobiledevices for newly created or modified blocks and then backs up only thesechanged blocks to the cloud storage. This considerably saves networkbandwidth.Some of the mobile applications have built-in feature that automatically backsup the mobile application data to the cloud. Even file sync-and-shareapplications synchronize data between the mobile device and the cloud storage.In a mobile cloud computing environment, if an application runs in a cloud, theapplication data is usually stored in the cloud. This data is backed up by theservice provider based on the SLAs. If the data on the mobile device is lost, thedata can be recovered from the cloud. Most of the cloud backup solutionsavailable today offer a self-service portal that allows users to recover datawithout manual intervention.
© Copyright 2021 Dell Inc.AppendixData Protection and Management-SSPPage 567Steps of Risk ManagementStep 1: Risk identificationpoints to the various sources of threats that giverise to risk.After identifying risks in a data protection environment, these risks and theirsources need to be classified into meaningful severity levels.oFor example organization performs remote replication over an unsecurednetwork. The risk identification step points to the sources of threat thatgive rise to risk in this replication environment.Step 2: Risk assessmentdetermines the extent of potential threat and the riskassociated with data protection resources.The output of this process helps organizations to identify appropriatecontrols for reducing or eliminating risk during the risk mitigation process.All the assets at risk (data, data source, protection application and storage,and management applications) must be carefully evaluated to assess theircriticality to the business.After the risks are assessed, the critical assets should be associated withpotential risks.oFor example, a company’s Intellectual Property records canbe identifiedas critical assets, and the disclosure of these records can be a risk ofhigh severity level.Step 3: Risk mitigationinvolves planning and deploying various securitycontrols (such as those discussed in Security Controls in Data ProtectionEnvironment lessons) that can either mitigate the risks or minimize the impact ofthe risks.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 610 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Dr. HOWARD SILVER

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture