O'Reilly logo

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide by Luis Ayala

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Luis Ayala 2016

Luis Ayala, Cyber-Physical Attack Recovery Procedures, 10.1007/978-1-4842-2065-8_2

2. Threats and Attack Detection

Luis Ayala

(1)Fredericksburg, Virginia, USA

When developing strategies for Recovery Procedures, it is helpful to consider the entire range of possible and probable cyber-physical attack vectors that present a risk to an organization. From that range of threats, likely scenarios can be developed and appropriate strategies applied. Any Recovery Procedures should be designed to be flexible enough to respond to extended building interruptions, as well as major natural disasters.

The best way to achieve this goal is to design Recovery Procedures that could be used to address a major natural disaster, but is divided into ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required