Emergency Planning Disasters That Can Critically Compromise Essay

Emergency Planning Disasters that can critically compromise the accessibility of knowledge include floods, fires, earthquakes, hurricanes, employee sabotage, computer viruses, and theft. The effects of disasters can lengthen even after the restructure of physical damage. Simply, the earlier a business recovers from a disaster; it will experience lesser wide-ranging continuing effects of the disaster. Not only the thrashing of sales during a disaster is destructive for the company, "the loss of customers, vendors, inventory and employee records extend recovery times from weeks and months to years" (Carlson & Parker, 1998). However, if a company has a premeditated disaster recovery plan (DRP), it can reduce the nuisance of a disaster, whereas inappropriate preparations can result in a business experiencing liquidation of its bank accounts (Carlson & Parker, 1998).

In the Information Technology industry, Disaster Recovery (DR) security issues occur repeatedly. The critical security measures in the environment are frequently covered by the storage. However, these measures mostly do not prove to be enough. The need of the time is that the IT disaster recovery plans must address data security issues as well. It is also necessary that the storage managers consider and observe data security from the point-of-view of a wicked mugger. If these two strategies are applied, there are higher chances for companies to recuperate and improve...

...

Most of the strategies and procedures in disaster recovery of data and information taken up by the companies may not be adequate for the disaster recovery of knowledge. However, in case of emergencies, if a company has already planned for knowledge recovery, it may involve good data and information recovery plan. This is exceedingly important that companies take a diversity of approaches regarding emergency recovery in terms of knowledge management.
How to Protect Knowledge in Disastrous Events?

Information security can be assured by strategizing incident response. Incident response is, in fact, several steps taken in order to respond to data violations, malware eruptions and breaches etc. In a proper way. In turn, incident response directly ties-in to business continuity (BC) and disaster recovery in due course. The advantage of having an incident response is that if information system is taken down due to a flood, terrorist or hack attack or malware, the company would still have a business continuity and disaster recovery issue. Security incident response is thus really important while building a company's disaster recovery plans and technologies because no one knows about any future incidents. However,…

Sources Used in Documents:

References

Carlson, S.J., & Parker, D. (1998). Disaster Recovery Planning and Accounting Information Systems. Review of Business, 19(2), 10+. Retrieved July 21, 2012, from Questia database: http://www.questia.com/PM.qst?a=o&d=5001370062

Disaster Recovery Security: The Importance of Addressing Data Security Issues in DR Plans. (2011, January). Retrieved July 21, 2012 from http://searchdisasterrecovery.techtarget.com/feature/Disaster-recovery-security-The-importance-of-addressing-data-security-issues-in-DR-plans

O'Sullivan, K. (2010, September 23). Knowledge Continuity: Strategies, Approach & Tools. Retrieved July 21, 2012 from http://star-knowledge.com/websites/star-knowledge/skblog/?p=70


Cite this Document:

"Emergency Planning Disasters That Can Critically Compromise" (2012, July 21) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/emergency-planning-disasters-that-can-critically-81202

"Emergency Planning Disasters That Can Critically Compromise" 21 July 2012. Web.25 April. 2024. <
https://www.paperdue.com/essay/emergency-planning-disasters-that-can-critically-81202>

"Emergency Planning Disasters That Can Critically Compromise", 21 July 2012, Accessed.25 April. 2024,
https://www.paperdue.com/essay/emergency-planning-disasters-that-can-critically-81202

Related Documents

("About FEMA," 2007) The method followed by FEMA is to lead the country in cases of a disaster, in a risk-based comprehensive emergency management system that would have as its important tenets preparedness, protection, response and recovery, and finally, mitigation of the losses that the people have suffered. These are some of the plans that FEMA has in place, and for which it recruits trainees: the National Response Plan, strategic

The Director will be responsible for compiling a monthly and yearly calendar that will detail the continuing education credit offerings, which are approved by the airport for attendance by staff including both optional and required events, and any outside offerings identified by staff will require prior approval for the allowance of credit toward the yearly goal. Pilots are responsible for maintaining certification for pilot's license and utilization of facility

Jurisdictional Emergency Planning for Domestic TerrorismDespite the confluence of multiple unprecedented existential threats to the United States and its citizens, including an ongoing global pandemic which is proving remarkably resilient, intensifying climate change and corresponding global warming, as well as Russian and North Korean dictators who are increasingly rattling their nuclear-tipped sabers, many security analysts agree that the most pressing threat facing America today is domestic terrorism. The purpose of

Threat Identification The threats How the threats are detected Ever since the September 11, 2001 terrorist attacks, businesses have had to critically rethink on the level of adequacy of their disaster recovery arrangements in relation to their business continuity plans as noted by Lam (2002,p.19). The September 11, 2001 tragedy effectively highlighted the importance for organizations to continue with their commercial operations even under the most exceptional of circumstance. My business which has

Aloud or in Writing, Making
PAGES 55 WORDS 17261

Companies such as XYZ Widget Corporation are well situated to take advantage of burgeoning markets in developing nations, particularly in Asia and Africa. 2. XYZ can grow its business by expanding its operations to certain developing nations in ways that profit the company as well as the impoverished regions that are involved, particularly when marketing efforts are coordinated with nongovernmental organizations operating in the region. 3. Several constraints and challenges must

Strategic Framework in BP-Deepwater horizon accident One of the most eminent names in the oil and gas industry is British Petroleum, considered as the largest provider of oil and gas to its customers for transportation, energy for heating and light and retail services for petrochemical products globally. The financial and operational picture of the company's performance is illustrated in table1 below. Performance at a glance for 2010 Facts and figures Sales and other operating