User Tools

Site Tools


cyber_security:cyber_recovery_strategy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
cyber_security:cyber_recovery_strategy [2022/06/15 15:41] – created petercyber_security:cyber_recovery_strategy [2022/06/15 15:43] (current) peter
Line 4: Line 4:
 **IMPORTANT**:  Disaster Recovery is not the same as Cybersecurity Recovery **IMPORTANT**:  Disaster Recovery is not the same as Cybersecurity Recovery
  
-  * It is a common misconception that disaster recovery and cybersecurity recovery are one in the same.+  * It is a common misconception that disaster recovery and cybersecurity recovery are one and the same.
   * Although they are similar and have some overlap, disaster recovery’s primary objective is to provide business continuity after disruption from man-made or natural causes.   * Although they are similar and have some overlap, disaster recovery’s primary objective is to provide business continuity after disruption from man-made or natural causes.
   * Security recovery, on the other hand, protects data assets after a data breach.   * Security recovery, on the other hand, protects data assets after a data breach.
  
 </WRAP> </WRAP>
- +
 ---- ----
  
-^^Disaster Recovery Plan^Security Recovery Plan^+^ ^Disaster Recovery Plan^Security Recovery Plan^
 |Primary Objective|Provide business continuity after disruption from man-made or natural causes.|Protect data assets after a data breach.| |Primary Objective|Provide business continuity after disruption from man-made or natural causes.|Protect data assets after a data breach.|
 |Response Requirements|Open communication with stakeholders, focus on rapid data recovery.|A stealthy approach that includes evidence collection and preservation, and route cause analysis.| |Response Requirements|Open communication with stakeholders, focus on rapid data recovery.|A stealthy approach that includes evidence collection and preservation, and route cause analysis.|
cyber_security/cyber_recovery_strategy.1655307661.txt.gz · Last modified: 2022/06/15 15:41 by peter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki