Single Window Systems
In the OIC Member States
105
impact/damages are high, in particular because it is a public service – unavailability of port or
customs clearance process can cause serious delays and the direct and indirect cost of downtime
are high.
2. Lack of Cost-effectiveness
Underutilization or lack of use of the hardware components’ performance and resources leads to
incorrect and less cost effective infrastructure design. The usage of dedicated clustering
technology dramatically increases the cost for expansion of the infrastructure and the required
level of services.
3. Performance Limitations
It is difficult to increase performance of the system if the operational data is not divided. To
store and manage the SW data is difficult task from the physical (repository) side, but also from
the logical point of view, taking into account the complexity and amount of data. Many SW keep
the operational data and archive (write off, expired permit and certificates data) on the same
physical and logical repository. The management and enquiry of such a large amount of data
decrease the overall performances of the SW infrastructure.
Policy Options
1. Use of High Availability Concept
The High Availability concept can maximize the accessibility of the SW IT infrastructure and its
supporting services. The advantages are
to deliver a cost efficient and continuous level of availability;
to provide a proactive, approach for the identification and correction of breaches in services
levels;
and reduced duration of downtime.
Availability is critical for business and user satisfaction as it is the most visible process for
outside users. High availability requires the definition of mission-critical services and
applications, which need to be designed for high availability.
A business continuity and disaster recovery minimize the downtime of the SW IT infrastructure
and services. It also prevents loss of data and services in the event of infrastructural failure. To
reduce costs of of a mirror or hot (warm) back up site, only the critical SW services can be
covered by the business continuity plan.
2. Virtualization
Use of virtualization, which is a concept that applies on services and application, storage and
72
ISO
Security.com, ISO/IEC 27031:2011 Information technology — Security techniques — Guidelines for information and
communications technology readiness for business continuity unde
r http://www.iso27001security.com/html/27031.html(accessed January 2017).




