Business Resilience in a Cyber World: Protect Against Attacks Part 2

Business Resilience in a Cyber World: Protect Against Attacks Part 2

ISBN13: 9798369319062|EISBN13: 9798369319079
DOI: 10.4018/979-8-3693-1906-2.ch001
Cite Chapter Cite Chapter

MLA

Burton, Sharon L. "Business Resilience in a Cyber World: Protect Against Attacks Part 2." Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology, edited by Darrell Norman Burrell, IGI Global, 2024, pp. 1-25. https://doi.org/10.4018/979-8-3693-1906-2.ch001

APA

Burton, S. L. (2024). Business Resilience in a Cyber World: Protect Against Attacks Part 2. In D. Burrell (Ed.), Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology (pp. 1-25). IGI Global. https://doi.org/10.4018/979-8-3693-1906-2.ch001

Chicago

Burton, Sharon L. "Business Resilience in a Cyber World: Protect Against Attacks Part 2." In Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology, edited by Darrell Norman Burrell, 1-25. Hershey, PA: IGI Global, 2024. https://doi.org/10.4018/979-8-3693-1906-2.ch001

Export Reference

Mendeley
Favorite

Abstract

This chapter examines the shift from business impact analysis to the business resilience required to safeguard organizations from cyber-attacks and endure such attacks if they befall. Skilled business resilience experts support accepted practices that enhance efficiencies and quality of business continuity strategy and planning programs, plus guard against cyber terrorism. Via this text's pages, readers learn about resilience as the final critical planning, preparative, and related action recommended to substantiate that organizations' significant business functions should either persist to function despite serious cataclysms or events of cyber terrorism that otherwise might interrupt services or production or will be recovered to an operational state within a reasonably short period. Explored is evidence of the ubiquitous reliance on technology in business strategies. Shown is how business resilience procedures provide an array of advantages. Readers will learn about business resilience as a long-term solution and business resilience cyber-risk management strategies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.