Business Continuity and Disaster Recovery Planning Term Paper by Nicky

A look at the three security approaches of prevention, deterrence and admonition as elements of a business continuity and disaster recovery plan.
# 151311 | 813 words | 3 sources | APA | 2012 | US
Published on May 31, 2012 in Business (General)


$19.95 Buy and instantly download this paper now

Description:

The paper discusses business continuity and disaster recovery plans as a very critical component of the business in order to ensure viability and resiliency in the event of disasters, emergencies and accidents. The paper then examines the three basic security approaches in the formulation of these plans, specifically, prevention, deterrence and admonitions systems. The paper also points out the need for an organization to set aside a budget for this purpose.

From the Paper:

"Setting up control measures and countermeasures is the deterrence aspect of the security approach top continuity and disaster preparedness. Thus, deterrence discourages the "attack by arranging for it not to be in anyone's interest to attack, or better, for it to be against the interests of those with the opportunity (Miller, 2007)." Indeed, employing control measures and countermeasures discourages the exploitation of the threats and vulnerabilities. Any would be attacker or even disaster will have lesser effects on a target because enough security mechanisms have been placed that protected or hardened the system from failures.
"Once enough prevention and deterrence measures have been emplaced, it may then be easy to determine beforehand of any danger or risks. This may sound like being clairvoyant or having foresight but it is not so. It simply means that since risk analysis has been done, control mechanisms are in place and "admonitions systems seek only to catch accidental violation of requests one does intend to abide by (Miller, 2007)." There is now a synergy amongst prevention, deterrence and admonition that in the event a problem or disaster occurs, there are already standard operating procedures in place to mitigate the effects of these negative events. But the three security approaches are not contained only in the documented business continuity and disaster recovery plan."

Sample of Sources Used:

  • Disaster Recovery World. (2006). The business continuity planning and disaster recovery planning directory. [Online] Retrieved November 4, 2009 from, http://www.disasterrecoveryworld.com/.
  • Miller, M.S. (2007). Computer security: Fact forum framework. [Online] Retrieved November 4, 2009 from, http://www.caplet.com/security/taxonomy/index.html.
  • Slater, D. (2009, October 28). "Business continuity and disaster recovery planning: The basics." CSO Online. [Online] Retrieved November 4, 2009 from, http://www.csoonline.com/article/204450/Business_Continuity_and_Disaster_Recovery_Planning_The_Basics.

Cite this Term Paper:

APA Format

Business Continuity and Disaster Recovery Planning (2012, May 31) Retrieved August 10, 2022, from https://www.academon.com/term-paper/business-continuity-and-disaster-recovery-planning-151311/

MLA Format

"Business Continuity and Disaster Recovery Planning" 31 May 2012. Web. 10 August. 2022. <https://www.academon.com/term-paper/business-continuity-and-disaster-recovery-planning-151311/>

Comments