Local System Remote System
System Access Latency
Bandwidth Data Security
Data Privacy Network Infrastructure

 

A computer system that is located elsewhere and can be accessed over a network or the internet. A computer system that is physically located nearby and operates independently from other systems.
The amount of time it takes for data to travel from one system to another. The ability to connect to and interact with a computer system.
Measures taken to protect data from unauthorized access, use, disclosure, disruption, modification, or destruction. The maximum amount of data that can be transmitted over a network connection in a given amount of time.
The hardware, software, and protocols used to connect devices and systems in a network. The right to control how personal information is collected, used, and shared.

 

Scalability Reliability
Security Compliance
Data Sovereignty Confidentiality
Availability Risk Management

 

The ability of a system to consistently perform its intended functions with minimal downtime or failures. The ability of a system to handle increased workload or accommodate growth without sacrificing performance.
The adherence to laws, regulations, guidelines, and standards relevant to an organization's business and industry. The protection of computer systems and data against unauthorized access, use, disclosure, disruption, modification, or destruction.
The protection of information from unauthorized access or disclosure, ensuring it is only accessible to authorized individuals. The concept that data is subject to the laws and regulations of the country in which it is located.
The process of identifying, assessing, and prioritizing potential risks to minimize their impact on an organization's objectives. The assurance that information and resources are accessible and usable when needed, without downtime or interruptions.

 

Audit Trail Upfront Cost
Operating Cost Capital Expenditure
Operating Expenditure Total Cost Of Ownership
Return On Investment Cost-Benefit Analysis

 

The initial cost or investment required to acquire or set up a product or service. A record of events and activities that provides documentary evidence of the sequence of activities that have affected a specific operation, procedure, or event.
An expense incurred to acquire an asset like equipment or infrastructure, which is recorded on the balance sheet. The ongoing cost incurred to operate or maintain a product or service.
The complete cost associated with owning and using a product or service over its lifetime, including both upfront and operating costs. An expense incurred to maintain day-to-day business activities, which is recorded on the income statement.
A systematic approach to comparing the costs and benefits of different options to determine the most favorable course of action. A measure of the profitability of an investment, calculated by dividing the net profit by the initial investment.

 

Depreciation Lifecycle Cost
Sunk Cost Business Continuity
Disaster Recovery Risk Assessment
Business Impact Analysis Emergency Response Plan

 

The total cost of a product or service over its entire lifecycle, including acquisition, operation, maintenance, and disposal costs. The decrease in value or usefulness of an asset over time, typically recorded as an expense on the income statement.
The ability of a business to continue its operations in the event of a disruption or disaster. A cost that has already been incurred and cannot be recovered, regardless of future actions or decisions.
The process of identifying and evaluating potential risks that could impact business continuity. The process of restoring and recovering systems, data, and infrastructure after a disaster or disruption.
A plan outlining the immediate actions and procedures to be followed during an emergency situation. The process of identifying the potential impact of disruptions on business operations and their financial consequences.

 

Incident Management Crisis Communication
Business Resilience Software As A Service
Cloud Computing Subscription-Based Model
On-Demand Software Virtualization

 

The process of delivering timely and accurate information during a crisis to internal and external stakeholders. The process of responding to and managing incidents to minimize their impact on business operations.
A software distribution model in which applications are hosted by a third-party provider and made available to customers over the internet. The ability of a business to adapt, recover, and grow despite disruptions or crises.
A pricing model where customers pay a recurring fee at regular intervals for access to a product or service. The delivery of computing services over the internet, including storage, servers, databases, networking, software, analytics, and more.
The process of creating a virtual version of a resource, such as a server, storage device, network, or operating system. Software that is delivered over the internet and is available to users whenever they need it.

 

Vendor Lock-In

 

Where a customer is dependent on a particular vendor for products and services, making it difficult or costly to switch to another vendor.