Abstract: This book provides a road-map for incident response and disaster recovery by incorporating appropriate security components in information environment of an organization. The authors have highlighted the risk, which is growing everyday where hackers are gunning to interfere and sabotage business applications running on any computer network. The vulnerability of computer based information system is always there whether as a stand-alone application or as distributed system over Wide Area Network or e-business operating in internet environments.
The authors have highlighted increasing instances of unauthorized intrusions into various computer networks causing disasters to valuable and confidential information system of many organizations The authors have proposed a well structured approach to build security measures as well as timely response with a view to mitigate down time of information system of the organization. Here the emphasis on have a contingency plans to response quickly and appropriately for various potential threats to the information system. They have also shown a way out for recovery and reconstruction of the system in the event a disaster takes place. The book includes disaster recovery principal and explains through case study to make it easy ro understand and apply in own business environment
Recommended for all system managers and CIOs
Dr Sarbjit Singh