Skip to main content

Disaster Preparedness and Resiliency

  • Chapter
  • First Online:
Guide to Reliable Internet Services and Applications

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

The most important thing to remember in this chapter is its title. The previous working version of the title was “Disaster Recovery,” which is certainly the most common phrase used to describe the set of activities associated with managing operations (including networks) through the most severe catastrophic incidents. Indeed, the kinds of activities that get publicity, make the headlines, and become the material for rewards and recognitions are the recovery activities that take place following a major disaster. The activities certainly do involve heroic acts and significant achievements worthy of credit. However, the problem with the term “Disaster Recovery” is the adjective, which places emphasis on the recovery activities that by definition take place after an event happens.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The term “business continuity” is generally used to encompass aspects of planning and managing operational continuity for any type of operation, and in this chapter is not limited strictly to commercial businesses. The fundamental techniques are equally applicable for government, academic, and not-for-profit operations. In the government environment, business continuity is often referred to as Continuity of Government (COG) or Continuity of Operations (COOP).

  2. 2.

    The following references are offered for those who would like to learn more about the subjects of business continuity, disaster management and recovery, and resiliency. They include descriptions of techniques and technologies, summaries of national policy challenges, and insights into the role of leadership before and during a disaster.

References

  1. Caralli, R. A., Stevens, J. F., Wallen, C. M., White, D. W., Wilson, W. R., & Young, L. R. (2007). Introducing the CERT Resiliency Engineering Framework: Improving the Security and Sustainability Processes, from http://www.sei.cmu.edu.

  2. Coates, J. (2006). Anticipating disaster from research, or putting the fear of God into top management. Research-Technology Management, 49(1), 6–9.

    MathSciNet  Google Scholar 

  3. Coutu, D. (2002). How resilience works. Harvard Business Review. 80(3), 46–55.

    Google Scholar 

  4. Elliott, D., Swartz, E., Herbane, B. (2001). Business continuity management: A crisis management approach. Boca Raton, FL: Taylor & Francis.

    Google Scholar 

  5. Financial Industry Regulatory Authority. (2008). FINRA Manual, from www.finra.org.

  6. Flin, R. (1996). Sitting in the hot seat: Leaders and teams for critical incident management. Chichester/England: Wiley.

    Google Scholar 

  7. Hiles, A. (2007). The definitive handbook of business continuity. New York: Wiley.

    Google Scholar 

  8. Hollnagel, E., Woods, D., & Leveson, N. (2006). Resilience engineering: Concepts and precepts. Aldershot/England: Ashgate.

    Google Scholar 

  9. Keanini, T. (2003). Vulnerability management technology: A powerful alternative to attack management for networks. Computer Technology Review, 23(5), 18–19.

    Google Scholar 

  10. McEntire, D. (2001). Triggering agents, vulnerabilities and disaster reduction: Towards a holistic paradigm. Disaster Prevention and Management, 10(3), 189–196.

    Article  Google Scholar 

  11. Reinmoeller, P., & van Baardwijk, N. (2005). The link between diversity and resilience. MITSloan Management Review, 46(4), 61–65.

    Google Scholar 

  12. Sheffi, Y. (2005). The resilient enterprise: Overcoming vulnerability for competitive advantage. Boston, MA: MIT Press.

    Google Scholar 

  13. Snedaker, S. (2007). Business continuity and disaster recovery planning for IT professionals. Amsterdam: Elsevier Science & Technology Books.

    Google Scholar 

  14. U.S. Department of Homeland Security. (2006). National Infrastructure Protection Plan, from http://www.dhs.gov.

  15. van Opstal, D. (2007). Transform: The resilient economy: Integrating competitiveness and security, from http://www.compete.org.

  16. Wallace, M., & Webber, L. (2004). The disaster recovery handbook: A step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York: AMACOM.

    Google Scholar 

  17. Weichselgartner, J. (2001). Disaster mitigation: The concept of vulnerability revisited. Disaster Prevention and Management, 10(2), 85–94.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susan R. Bailey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London

About this chapter

Cite this chapter

Bailey, S.R. (2010). Disaster Preparedness and Resiliency. In: Kalmanek, C., Misra, S., Yang, Y. (eds) Guide to Reliable Internet Services and Applications. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84882-828-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-828-5_14

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-827-8

  • Online ISBN: 978-1-84882-828-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics