Disaster Recovery plans. These are intended to provide infrastructure andoperations capabilities at another location. These plans assume that suchoperations cannot continue at the original location due to forces of nature(e.g. earthquakes, weather conditions) or deliberate actions such as sabotage,terrorist attacks, etc.It should be noted that Disaster Recovery plans focus on physical infrastructure andwill be of limited use if software or data have been corrupted through some form ofcyber-attack.The next level of planning for continued operations is that of Business ContinuityPlanning and addresses the possible unavailability of offices, access to buildings orsignificant interruptions of utilities. Business Continuity Planning is not theresponsibility of information systems and I.T. operations providers.Crisis Management is the third major component of responding to informationsecurity events. It differs from the above two insofar that it involves parties outsidethe organisation, i.e. stakeholders, the media and others depending on the nature of theorganisation.8.4. The legislative landscapeAs mentioned earlier, the Council of Europe Convention on Cybercrime is anestablished instrument that addresses the cross-border nature of cybercrime. There isalso the European Union Directive 95/46/EC on Data Protection, of which a draftintended to supersede it was made public early in 2012.These complements national portfolios of legislation. As technical innovation isfaster than establishing legislation there remain many grey areas. These y vary fromcountry to country. Corporate legal counsel is best qualified to identify applicablelegislation and brief those responsible for the implementation and operation ofcomputer systems and services about them
đang được dịch, vui lòng đợi..
