Cyber-Physical Attack Recovery Procedures pp 15-26 | Cite as
Threats and Attack Detection
Chapter
First Online:
Abstract
When developing strategies for Recovery Procedures, it is helpful to consider the entire range of possible and probable cyber-physical attack vectors that present a risk to an organization. From that range of threats, likely scenarios can be developed and appropriate strategies applied. Any Recovery Procedures should be designed to be flexible enough to respond to extended building interruptions, as well as major natural disasters.
Copyright information
© Luis Ayala 2016