Disaster recovery planning (2nd ed.): strategies for protecting critical information
Disaster recovery planning (2nd ed.): strategies for protecting critical information
Information Systems Management in Practice
Information Systems Management in Practice
Business continuity and the banking industry
Communications of the ACM
Capturing security requirements in business processes through a UML 2.0 activity diagrams profile
CoMoGIS'06 Proceedings of the 2006 international conference on Advances in Conceptual Modeling: theory and practice
Towards a UML 2.0 extension for the modeling of security requirements in business processes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Analysis-level classes from secure business processes through model transformations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.02 |
With the number of attacks on systems increasing, it is highly probable that sooner or later an intrusion will be successful. Not having to execute a complete shutdown in this situation will soon be a standard requirement. The intention of this paper therefore is to give an overview of business continuity management and to address selected issues in system survivability and business continuity management. The core question is how systems should be built in order to cope with a successful intrusion, i.e. being able to balance the necessity to be up and running with the potential damage that can be done by an intruder.