Calamity occurrence in any area, arising from natural or man-made causes, or by accident or negligence which results in substantial loss of asset or business, Flood: Any unplanned event that requires immediate redeployment of limited resources is defined as cyber Disaster Recovery Plan.
Natural Forces:
Technical Failure:
Human Interference:
Also Read Most Important Consideration for Industrial Control System(ICS) Cyber Defense
What is a Disaster Recovery Plan?
A management document for how and when to utilize resources needed to maintain selected functions when disrupted by agreed-upon incidents.
Other commonly used names:
When an incident occurs, the Disaster Recovery response activities are likely to be the following (at a high level).
Types of Controls:
Integrity Controls:
Confidentiality Controls:
Availability Controls:
An Example of Disaster Recovery Team:
Case Study- The CFlood: Impact
Case Study- The Chicago Flood: Disaster Recovery
Case Study- The Chicago Flood: Recovery Result
Case Study- The World Trade Center Explosion: Impact
Also Read An approach to Tackle Internet Security Issues at Work
Case Study- The World Trade Center Explosion: Recovery
Case Study- The World Trade Center Explosion: Recovery Result
Examples of Cyber Disaster Recovery Services:
Alternate Sites
Business Impact Analysis
Certification
Education Classes
On-Site Recovery Facilities
Satellite Communication
The business continuity plan is a more proactive approach, as it describes how an organization can maintain operations during an emergency.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.
The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee…
A threat actor reportedly sells a database containing 49 million user records from Dell, one of the world's leading technology…
A safe and trusted Google Play experience is our top priority. We leverage our SAFE (see below) principles to provide…
BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or…
A new RAT malware has been discovered to be targeting Android devices. This malware is capable of executing additional commands…
A serious concern has arisen for iPhone users in the European Union as a newly discovered flaw in Apple's Safari…