Data protection : governance, risk management, and compliance /: governance, risk management, and compliance. (©2010)
- Record Type:
- Book
- Title:
- Data protection : governance, risk management, and compliance /: governance, risk management, and compliance. (©2010)
- Main Title:
- Data protection : governance, risk management, and compliance
- Further Information:
- Note: David G. Hill.
- Other Names:
- Hill, David G (David Gary), 1943-
- Contents:
- The Time Has Come for Change What to Look for in This Chapter Why Data Protection Is Important What Data Protection Is Data Protection Has to Be Placed in the Right Framework Evolving to the Governance, Risk Management, and Compliance Framework Ride the Sea Change in Data Protection How to Read This Book An Aside on Process Management Key Takeaways Business Continuity: The First Foundation for Data Protection What to Look for in This Chapter Business Continuity as a Key to Risk Management Business Continuity and Data Protection Business Continuity Is Not Just Disaster Recovery Disaster Recovery: Let’s Get Physical Operational Recovery: Think Logically Disaster Recovery Requires Judgment; Operational Recovery Requires Automation Logical Data Protection Gets Short Shift in Business Continuity Do Not Neglect Any Facet of Data Protection Key Takeaways Data Protection—Where the Problems Lie What to Look for in This Chapter Data Protection as It Was in the Beginning Typical Data Protection Technology Today Still Leaves a Lot to Be Desired Summing up Data Protection Challenges by Category Key Takeaways Data Protection—Setting the Right Objectives What to Look for in This Chapter How High Is High Enough for Data Availability? SNIA’s Data Value Classification: A Point of Departure Do Not Equate Availability with Value Availability Objectives for Operational Recovery and Disaster Recovery Are Not Necessarily the Same Availability Is Not the Only Data Protection Objective All PrimaryThe Time Has Come for Change What to Look for in This Chapter Why Data Protection Is Important What Data Protection Is Data Protection Has to Be Placed in the Right Framework Evolving to the Governance, Risk Management, and Compliance Framework Ride the Sea Change in Data Protection How to Read This Book An Aside on Process Management Key Takeaways Business Continuity: The First Foundation for Data Protection What to Look for in This Chapter Business Continuity as a Key to Risk Management Business Continuity and Data Protection Business Continuity Is Not Just Disaster Recovery Disaster Recovery: Let’s Get Physical Operational Recovery: Think Logically Disaster Recovery Requires Judgment; Operational Recovery Requires Automation Logical Data Protection Gets Short Shift in Business Continuity Do Not Neglect Any Facet of Data Protection Key Takeaways Data Protection—Where the Problems Lie What to Look for in This Chapter Data Protection as It Was in the Beginning Typical Data Protection Technology Today Still Leaves a Lot to Be Desired Summing up Data Protection Challenges by Category Key Takeaways Data Protection—Setting the Right Objectives What to Look for in This Chapter How High Is High Enough for Data Availability? SNIA’s Data Value Classification: A Point of Departure Do Not Equate Availability with Value Availability Objectives for Operational Recovery and Disaster Recovery Are Not Necessarily the Same Availability Is Not the Only Data Protection Objective All Primary Data Protection Objectives Have to Be Met Key Takeaways Data Protection—Getting the Right Degree What to Look for in This Chapter General Use Classes of Data The Third Degree—Levels of Exposure Key Takeaways Information Lifecycle Management Changes the Data Protection Technology Mix What to Look for in This Chapter Why Data Lifecycle Management Is Not Enough—The Need for Metadata and Management ILM Is Deep into Logical Pools of Storage Archiving through a New Lens Active Archiving and Deep Archiving ILM Changes the Data Protection Technology Mix Key Takeaways Compliance: A Key Piece of the GRC Puzzle What to Look for in This Chapter What Compliance Is All About The Relationship between Compliance and Risk Management Compliance and Data Protection The Role of People in Compliance The Role of Process in Compliance The Role of Technology in Compliance Key Takeaways Governance: The Last Piece in the GRC Puzzle What to Look for in This Chapter Data Governance Must Respond to Changes in the Federal Rules of Civil Procedure The Impact on Global Civil Litigation The Big Three—Governance, Risk Management, and Compliance—and Data Protection Objectives Key Takeaways The Critical Role of Data Retention What to Look for in This Chapter The Need for Data Retention Management Where the Responsibility for Data Retention Policy Management Lies Making the Case for Archiving for Data Retention Compliance and Governance Creating Data Archive Storage Pools by Data Retention Attributes Key Takeaways Data Security—An Ongoing Challenge What to Look for in This Chapter How Data Protection and Data Security Are Interrelated Information Security versus Data Security Information Assurance Information Risk Management Data Preservation Is Data That Is Good to the Last Bit Confidentiality as a Private and Public Concern The Role of Data Availability in Data Security Three Strategies for Protecting Confidentiality of Information Confidentiality through Limiting Access to Data Confidentiality through Limiting Use of Information Confidentiality by Rendering Information Unusable to Unauthorized Users The Special Case of Storage Security Key Takeaways Where Data Protection Technologies Fit in the New Model What to Look for in This Chapter Categorizing Data Protection Products Mapping the Base Data Protection Technologies to the ILM Version of the Data Protection Framework Key Takeaways Back to Basics—Extending the Current Model What to Look for in This Chapter The Move to Multiple-Parity RAID Evolving Backup/Restore Software Recovery Management Moving Data Manually and Electronically—The Place of Vaulting and Consolidation Remote Office Data Protection At Your Service—The Role of Service Suppliers Key Takeaways When Supporting Actors Play Lead Roles What to Look for in This Chapter Data Deduplication and Other Space-Saving Technologies WAN Acceleration Data Protection Management Data Protection Change Management Disaster Recovery Testing Data Classification Key Takeaways Disk and Tape—Complementing and Competing with One Another What to Look for in This Chapter Disk-Based Backup Speeding up the Backup/Restore Process—Your Mileage May Vary Improving Restore Reliability Keep in Mind Virtual Tape Virtual Tape Library MAID Removable Disk Drives and Disk Media Data Protection Appliances Tape Automation Key Takeaways Technologies for High Availability and Low (or No) Data Loss What to Look for in This Chapter Copy Strategies Replication Strategies Key Takeaways Special Requirements for Compliance, Governance, and Data Security What to Look for in This Chapter The Use of WORM Technology WORM Tape WORM Disk Electronic Locking Guaranteeing the Authenticity of Data Encryption Techniques Compliance/Governance Appliance Data Shredding Key Takeaways eDiscovery and the Electronic Discovery Reference Model What to Look for in This Chapter Information Management—Getting eDiscovery off on the Right Foot Overview of the Steps of the EDRM Model Key Takeaways Cloud Computing, SaaS, and Other Data Protection Services What to Look for in This Chapter Growth in Services Raises Questions for Data Protection An Introduction to Cloud Computing Where IT Services Are Headed Data Protection Considerations in Using a Services Model Confronting the Issue of Control and Third-Party Services Key Takeaways Other Considerations in Data Protection What to Look for in This Chapter From Flash Computing to Tape—The Role of Tiering in Data Protection The Impact of Server and Storage Virtualization on Data Protection Master Data Management and Data Protection Green Computing and Data Protection Key Takeaways Tying It All Together, Including the PRO-Tech Data Protection Model What to Look for in This Chapter The PRO-Tech Model for Data Protection The PRO-Tech Model—Level 1 Tying the PRO-Tech Layers to GRC Busi … (more)
- Publisher Details:
- Boca Raton, FL : Taylor & Francis
- Publication Date:
- 2010
- Copyright Date:
- 2010
- Extent:
- 1 online resource (xxv, 304 pages), illustrations
- Subjects:
- 005.8/6
Computer security
Data protection
Information technology -- Security measures
COMPUTERS -- System Administration -- Disaster & Recovery
Computer security
Data protection
Information technology -- Security measures
Electronic books - Languages:
- English
- ISBNs:
- 9781439806937
1439806934 - Related ISBNs:
- 9781439806920
1439806926 - Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.150437
- Ingest File:
- 01_091.xml