Local System | Remote System |
System Access | Latency |
Bandwidth | Data Security |
Data Privacy | Network Infrastructure |
A computer system that is located elsewhere and can be accessed over a network or the internet. | A computer system that is physically located nearby and operates independently from other systems. |
The amount of time it takes for data to travel from one system to another. | The ability to connect to and interact with a computer system. |
Measures taken to protect data from unauthorized access, use, disclosure, disruption, modification, or destruction. | The maximum amount of data that can be transmitted over a network connection in a given amount of time. |
The hardware, software, and protocols used to connect devices and systems in a network. | The right to control how personal information is collected, used, and shared. |
Scalability | Reliability |
Security | Compliance |
Data Sovereignty | Confidentiality |
Availability | Risk Management |
The ability of a system to consistently perform its intended functions with minimal downtime or failures. | The ability of a system to handle increased workload or accommodate growth without sacrificing performance. |
The adherence to laws, regulations, guidelines, and standards relevant to an organization's business and industry. | The protection of computer systems and data against unauthorized access, use, disclosure, disruption, modification, or destruction. |
The protection of information from unauthorized access or disclosure, ensuring it is only accessible to authorized individuals. | The concept that data is subject to the laws and regulations of the country in which it is located. |
The process of identifying, assessing, and prioritizing potential risks to minimize their impact on an organization's objectives. | The assurance that information and resources are accessible and usable when needed, without downtime or interruptions. |
Audit Trail | Upfront Cost |
Operating Cost | Capital Expenditure |
Operating Expenditure | Total Cost Of Ownership |
Return On Investment | Cost-Benefit Analysis |
The initial cost or investment required to acquire or set up a product or service. | A record of events and activities that provides documentary evidence of the sequence of activities that have affected a specific operation, procedure, or event. |
An expense incurred to acquire an asset like equipment or infrastructure, which is recorded on the balance sheet. | The ongoing cost incurred to operate or maintain a product or service. |
The complete cost associated with owning and using a product or service over its lifetime, including both upfront and operating costs. | An expense incurred to maintain day-to-day business activities, which is recorded on the income statement. |
A systematic approach to comparing the costs and benefits of different options to determine the most favorable course of action. | A measure of the profitability of an investment, calculated by dividing the net profit by the initial investment. |
Depreciation | Lifecycle Cost |
Sunk Cost | Business Continuity |
Disaster Recovery | Risk Assessment |
Business Impact Analysis | Emergency Response Plan |
The total cost of a product or service over its entire lifecycle, including acquisition, operation, maintenance, and disposal costs. | The decrease in value or usefulness of an asset over time, typically recorded as an expense on the income statement. |
The ability of a business to continue its operations in the event of a disruption or disaster. | A cost that has already been incurred and cannot be recovered, regardless of future actions or decisions. |
The process of identifying and evaluating potential risks that could impact business continuity. | The process of restoring and recovering systems, data, and infrastructure after a disaster or disruption. |
A plan outlining the immediate actions and procedures to be followed during an emergency situation. | The process of identifying the potential impact of disruptions on business operations and their financial consequences. |
Incident Management | Crisis Communication |
Business Resilience | Software As A Service |
Cloud Computing | Subscription-Based Model |
On-Demand Software | Virtualization |
The process of delivering timely and accurate information during a crisis to internal and external stakeholders. | The process of responding to and managing incidents to minimize their impact on business operations. |
A software distribution model in which applications are hosted by a third-party provider and made available to customers over the internet. | The ability of a business to adapt, recover, and grow despite disruptions or crises. |
A pricing model where customers pay a recurring fee at regular intervals for access to a product or service. | The delivery of computing services over the internet, including storage, servers, databases, networking, software, analytics, and more. |
The process of creating a virtual version of a resource, such as a server, storage device, network, or operating system. | Software that is delivered over the internet and is available to users whenever they need it. |
Vendor Lock-In | |
Where a customer is dependent on a particular vendor for products and services, making it difficult or costly to switch to another vendor. | |