Calamity occurrence in any area, arising from natural or man-made causes, or by accident or negligence which results in substantial loss of asset or business, Flood: Any unplanned event that requires immediate redeployment of limited resources is defined as cyber Disaster Recovery Plan.
Natural Forces:
Technical Failure:
Human Interference:
Also Read Most Important Consideration for Industrial Control System(ICS) Cyber Defense
What is a Disaster Recovery Plan?
A management document for how and when to utilize resources needed to maintain selected functions when disrupted by agreed-upon incidents.
Other commonly used names:
When an incident occurs, the Disaster Recovery response activities are likely to be the following (at a high level).
Types of Controls:
Integrity Controls:
Confidentiality Controls:
Availability Controls:
An Example of Disaster Recovery Team:
Case Study- The CFlood: Impact
Case Study- The Chicago Flood: Disaster Recovery
Case Study- The Chicago Flood: Recovery Result
Case Study- The World Trade Center Explosion: Impact
Also Read An approach to Tackle Internet Security Issues at Work
Case Study- The World Trade Center Explosion: Recovery
Case Study- The World Trade Center Explosion: Recovery Result
Examples of Cyber Disaster Recovery Services:
Alternate Sites
Business Impact Analysis
Certification
Education Classes
On-Site Recovery Facilities
Satellite Communication
The business continuity plan is a more proactive approach, as it describes how an organization can maintain operations during an emergency.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.
Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network –…
Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest…
Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…
A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…
GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…
A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been…