Bpp learning Media is an acca approved Content Provider


Disaster recovery plan  Any disaster recovery plan must provide for:  (a)  Standby procedures



Download 5,67 Mb.
Pdf ko'rish
bet359/727
Sana05.04.2022
Hajmi5,67 Mb.
#530463
1   ...   355   356   357   358   359   360   361   362   ...   727
Bog'liq
F1 BPP ST(August 2020) [Unlocked by www.freemypdf.com] (1)

 
6.3.1 Disaster recovery plan 
Any disaster recovery plan must provide for: 
(a) 
Standby procedures 
so that some operations can be performed while normal services are 
disrupted 
(b) 
Recovery procedures 
once the cause of the breakdown has been discovered or corrected 
(c) 
Personnel management 
policies to ensure that (a) and (b) above are implemented properly 
6.3.2 Contents of a disaster recovery plan 

disaster recovery plan
must cover all activities, from the initial response to a 'disaster' through to 
damage limitation and full recovery. Responsibilities must be clearly spelt out for all tasks. 
BPP Tutor Toolkit Copy


PART C: ACCOUNTING AND REPORTING SYSTEMS, CONTROLS AND COMPLIANCE 
 
258
 
6.4 Cyber risk, cyber-attack and cyber security 
Cyber-attacks have been briefly mentioned in this section, we shall now consider them in more detail in 
connection with cyber risk and cyber security. 

Cyber risk
is a term that covers a number of organisational risks which are possible 
consequences of a cyber-attack. Cyber risks include; financial losses, reputational damage and 
operational disruption. 

Cyber-attacks
are deliberate attempts to damage an organisation by using the Internet to take 
advantage of poor security controls and system integrity. 

Cyber security
is the protection of computer systems from the risk of cyber-attack through the 
use of hardware and software security procedures and controls.
6.4.1 Key cyber risks 
The 
main risks 
to an organisation that cyber-attacks may bring include: 
(a) 
Financial loss 
- the risk that the organisation will lose money, either through having funds 
directly stolen, but also the cost of repairing the damage caused by a cyber-attack (including the 
payment of fines if IT controls are deemed not sufficient to protect customer data). 
(b) 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   355   356   357   358   359   360   361   362   ...   727




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish