Networking Technologies for Business Continuity

Networking Technologies for Business Continuity

Nijaz Bajgoric
DOI: 10.4018/978-1-60566-160-5.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Continuous computing technologies explored in previous chapters, in many cases, are located on different locations. However, they depend on each other and are bound to data communication and networking technologies that are used in order to ensure data transfers. Therefore, the data communications technologies are crucial in ensuring continuous computing each time when computing devices and users are located in different locations. Chapter XII provides some explanations on them and their role in business continuity.
Chapter Preview
Top

Network Infrastructure And Network Downtime

Networking infrastructure is a prerequisite for any kind of e-business in networked economy. It consists of several data communications and computer network technologies that are implemented in order to come up with appropriate data communications—computer network platform. Computer network infrastructure is very important from business continuity perspective since any disconnection failure that occurs on it can cause data unavailability.

As shown in Figure 1, these technologies make the third layer of an information system that enables continuous computing.

Figure 1.

Continuous computing layers: The role of networking infrastructure (Layer 3)

978-1-60566-160-5.ch012.f01

They include technologies such as communication devices, communication media, communication protocols, network operating systems, networking protocols, data protection and security standards. Network cards, modems, cable modems, DSL modems, routers, bridges, switches, hubs, firewalls, and so forth, are used to connect computers within local area networks, wide area networks, virtual private networks, campus networks, metropolitan networks. Several communication media, guided and non-guided, such as leased lines, ISDN, ATM, frame-relay, wireless communications devices and protocols, satellite communications, and so forth, are used in order to establish several types of computer networks. These networks are in turn basis for networked enterprises, e-business, e-government and e-economy. Hunter (2008) noted that recent Internet outages in the Middle-East bring customary boom in business continuity.

In addition to data communication hardware and software glitches and failures, another threat with regard to business continuity is in network attacks. Network attacks today can come in the form of competitive espionage, disgruntled ex-employees, hackers, crackers, other forms of outsiders willing to use our servers to store music, movies, pornography, pirated software and so on.

In modern Internet era, in what is called “networked business,” the network security in an organization that operates in such a kind of environment is a business continuity problem. A famous saying, “A chain is only as strong as its weakest link” applies as a rule in modern e-business.

Network downtime caused by security attacks is costing large enterprises more than $30 million a year, according to a recent study by Infonetics Research.

According to the study, “The Costs of Network Security Attacks: North America 2007,” large organizations are losing an average of 2.2% of their annual revenue because of security attacks. That may sound relatively small, but when coupled with the extra few percentage points of revenue companies lose to non-security related downtime, the loss is much higher.

Large companies take the biggest hit from security-related downtime, but results show that small and midsized businesses (SMBs) stand to lose about half a percent of their annual revenue to security-related downtime, which can translate to hundreds of thousands of dollars annually. Cisco provides a framework of the impacts of network failures (Cisco White Paper, 2004).

Measures that have to be implemented in order to have the networking infrastructure more secure include:

Complete Chapter List

Search this Book:
Reset