100%(9)9 out of 9 people found this document helpful
This preview shows page 4 - 6 out of 7 pages.
maybe not to put data in the cloud but rather hired a skilled Information Technology Specialist tohelp in protecting this data.The five key areas matching a good website security policy are identification and authentication policies, password management policies, encryption policies, software licensing and updates policies and privacy policies. Below is a short table matching a good website security policy.Identification and Authentication PoliciesPassword Management PoliciesEncryption PoliciesWebsite Security PolicySoftware Licensing and Updates PoliciesPrivacy PoliciesHigh availability can be defined as a characteristic of a system which target to ensures a continuously level of operational performance for a higher than normal period of time. Availability can be measured relative to 100 percentage operational availability.Redundancy is a system design having a secondary or alternate component which is duplicated to take over if there is a failure in the unit. This serves as a backup. Fault tolerance is a property that enable a system to continue its intended operation at no loss of service rather than failing completely when some part of the system fails.
Running Header: IT 286 Unit 1 Assignment 5The difference between high availability and fault tolerance are, high availability ensure a resource stays available, but the resource may suffer from some minor downtime while fault tolerance ensures no lose the in-memory application state in the event of a failure. Redundancy and fault tolerance similarities are, they both serves as a backup design.Reliability is an essential factor that a business needs to lead among its competitive. A business can be trusted on this factor of reliability. As a Chief Information Officer (CIO), employees must be education on the important of this quality so as to showcase this quality in production. On the other end, taking about accountability keeps a business moving forward by accounting for its activities in terms of money and entrusted property and accepting its responsibility in a transparency manner. As a Chief Information Officer (CIO), I will make sure