Skip to main content

Major incident tsunami


A major incident tsunami, is when a single or a group of Information Technology major incidents occur in a single wave during a very short time period. A tsunami is a single large wave often caused by earthquakes with deep sea epicentres. As with a real tsunami, the effects of an IT major incident tsunami can be devastating.
Examples of major incident tsunamis are:
  • worm or virus outbreak like the Nimda virus.
  • patching bug that disables a large proportion of a corporate's desktop.
  • power failure in the data centre where the backup systems fail to operate.
  • when a redundant system experiences a failure to both redundant components.
  • security certificates expiring on a large number of networked devices , resulting in them all becoming inoperable.
  • a migration process fault where a flood of calls hits a call centre simultaneously.
When a major incident tsunami hits, the internal support capabilities of an organization are overwhelmed. The best method to handle these occureneces is to bring in IT firefighters on short term contracts, to deal with the issue. These IT firefighters will be skilled in dealing with major incident tsunamis and be experienced and skilled in the processes of resolving them.
These modern day IT firefighters are similar to the oil firefighters as represented by the legendary, Red Adair.

It is my prediction that during the next five years, the rate of major incident tsunamis will increase. Eventually, each of these incidents could be graded in a manner that earthquakes are graded via the Richter scale. It will eventually be very easy to identify a major incident tsunami via this scale as all incidents above a certain value will be graded as tsunamis. I suggest using the name, the Hopper Scale, after Grace Hopper, the first bug detector. Any ideas on how to calculate this scale?


Comments

Popular posts from this blog

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

No Scrubs: The Architecture That Made Unmetered Mitigation Possible

When building a DDoS mitigation service it’s incredibly tempting to think that the solution is scrubbing centers or scrubbing servers. I, too, thought that was a good idea in the beginning, but experience has shown that there are serious pitfalls to this approach. Read the post of at Cloudflare's blog: N o Scrubs: The Architecture That Made Unmetered Mitigation Possible

Should You Buy A UniFi Dream Machine, USG, USG Pro, or Dream Machine Pro?