338
human, 23
identifying, 301
impact, 26
insider, 313–14
likelihood, 309
natural, 23
personal privacy, xxiii
statement, 25
Time-based security, 219–20
Tornados, 31–33
planning, 32
procedures, 32
watches vs. warnings, 32
Training, 4–5, 304
budget preparation, 236
exercise, 237
feedback questionnaires, 236–37
materials development, 235–36
needs assessment, 235
objectives/scope of, 235
schedule, preparing, 236
security, 300
security professionals, 315–18
staff, 234–37
system administrator, 304
user, 304
Tunneling, 102–3
Uninterruptible power supplies (UPSs), 110–
11
UNIX Crack, lxii
Unscheduled maintenance, 246–47
Updating, 203
Utilities
as business recovery activity, 187–88
fraud, xxv
power, 187–88
Utilities/service loss, 54–56
communication services, 56
drainage/waste removal, 56
electrical power failure, 55
gas supply, 55
petroleum/oil shortage, 55
water supply, 55
See also Emergency Incident Assessment
Validation, 4
Virtual private networks (VPNs), 79, 100–
103
connections, 103
defined, 100
implementations, 101–2
selection, 101
See also Preventative measures
Vulnerabilities
analysis chart, 24
defined, 25
likelihood, 67
Warehouse facilities/stock, 190
Warm sites
defined, 92, 135
maintenance, 135
Water sensors, 114
Water supply loss, 55
Web sites, as hacker entry point, 150
Winter storms, 36
Workplace violence, 63

Get Business Continuity and Disaster Recovery for InfoSec Managers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.