Calamity occurrence in any area, arising from natural or man-made causes, or by accident or negligence which results in substantial loss of asset or business, Flood: Any unplanned event that requires immediate redeployment of limited resources is defined as cyber Disaster Recovery Plan.
Natural Forces:
Technical Failure:
Human Interference:
Also Read Most Important Consideration for Industrial Control System(ICS) Cyber Defense
What is a Disaster Recovery Plan?
A management document for how and when to utilize resources needed to maintain selected functions when disrupted by agreed-upon incidents.
Other commonly used names:
When an incident occurs, the Disaster Recovery response activities are likely to be the following (at a high level).
Types of Controls:
Integrity Controls:
Confidentiality Controls:
Availability Controls:
An Example of Disaster Recovery Team:
Case Study- The CFlood: Impact
Case Study- The Chicago Flood: Disaster Recovery
Case Study- The Chicago Flood: Recovery Result
Case Study- The World Trade Center Explosion: Impact
Also Read An approach to Tackle Internet Security Issues at Work
Case Study- The World Trade Center Explosion: Recovery
Case Study- The World Trade Center Explosion: Recovery Result
Examples of Cyber Disaster Recovery Services:
Alternate Sites
Business Impact Analysis
Certification
Education Classes
On-Site Recovery Facilities
Satellite Communication
The business continuity plan is a more proactive approach, as it describes how an organization can maintain operations during an emergency.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.
A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…
Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…
ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…
Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and…
The U.S. government has offered a prize of up to $5 million for information that leads to the arrest and…
Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic goals,…