Threats and Attack Detection

  • Luis Ayala
Chapter

Abstract

When developing strategies for Recovery Procedures, it is helpful to consider the entire range of possible and probable cyber-physical attack vectors that present a risk to an organization. From that range of threats, likely scenarios can be developed and appropriate strategies applied. Any Recovery Procedures should be designed to be flexible enough to respond to extended building interruptions, as well as major natural disasters.

Copyright information

© Luis Ayala 2016

Authors and Affiliations

  • Luis Ayala
    • 1
  1. 1.FredericksburgUSA

Personalised recommendations