Hadmérnök ◽  
2019 ◽  
Vol 14 (1) ◽  
pp. 352-370
Author(s):  
Zsolt Zólyomi

The security professionals are always talking about Emergency Plan, Emergency Preparedness, Emergency Response, Crisis Management, Crisis Management Plan, Business Continuity Management, Business Continuity Plan. etc. That is a question whichcomes to my mind do we know exactly what these phrases meanings are? My experiences show, usually we have different interpretations on the above mentioned expressions. Briefly we need to have an Emergency Plan to provide our Emergency Preparedness and to be able to take our Emergency Responses in case of a real Emergency situation. If we were able to eliminate the Emergency situation the problemhas been solved. If we had no success the Emergency can be develop a crisis situation which we need to manage by the Crisis Management Plan. As we are over the crisis we need to adopt our Business Continuity Plan to be able to manage our continuous operationor production. The aim of this study to providea useful tool or set up for security leaders on Crisis Management which is a clear security task and not as like Emergency Preparedness which is related to safety organization as Business Continuity is connected to each business functions.


Author(s):  
Holmes E. Miller ◽  
Kurt J. Engemann

In this article, the authors discuss how business continuity methodologies can be used by data centers to respond to natural disasters, man-made disasters, and accidents. Because organizations depend on computing services, which may become unavailable when disasters strike, prudent risk management processes can provide for continuation and recovery of operations. With a focus on data centers, this article discusses the business continuity plan development process. This article also considers elements of a business continuity management plan, which includes strategy development, preparedness, mitigation, exercises, and response and recovery, and discuss business continuity strategies for colocation and cloud-based data center architectures. Finally, the authors discuss how the ordered weighted average (OWA) methodology can be used to incorporate a decision makers risk profile when confronted with decisions related to the processes discussed.


2007 ◽  
Vol 2 (4) ◽  
pp. 79-96 ◽  
Author(s):  
Concetto Bonafede ◽  
Paola Cerchiello ◽  
Paolo Giudici

2004 ◽  
Vol 37 (5) ◽  
pp. 386 ◽  
Author(s):  
Brahim Herbane ◽  
Dominic Elliott ◽  
Ethné M. Swartz

Sign in / Sign up

Export Citation Format

Share Document