Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Business continuity planning
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Threat and risk analysis (TRA)=== After defining recovery requirements, each potential threat may require unique recovery steps (contingency plans or playbooks). Common threats include: {{columns-list|colwidth=18em| * [[Epidemic]]/pandemic * [[Earthquake]] * Fire * [[Flood]] * [[Hacker (computer security)|Cyber attack]] * [[Sabotage]] (insider or external threat) * [[Hurricane]] or other major storm * [[Power outage]] * Water outage (supply interruption, contamination) * Telecomms outage * IT outage * [[Terrorism]]/[[Piracy]] * [[War]]/civil disorder * Theft (insider or external threat, vital information or material) * Random failure of mission-critical systems * Single point dependency * Supplier failure * Data corruption * Misconfiguration * Network outage }} The above areas can cascade: Responders can stumble. Supplies may become depleted. During the 2002β2003 [[SARS]] outbreak, some organizations compartmentalized and rotated teams to match the [[incubation period]] of the disease. They also banned in-person contact during both business and non-business hours. This increased [[Resilience (organizational)|resiliency]] against the threat.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)