15

Recovery Process

The previous chapter looked at how an attack can be investigated to understand the cause of an attack and prevent similar attacks in the future. However, an organization cannot fully rely on the assumption that it can protect itself from every attack and all the risks that it faces. The organization is exposed to a wide range of potential disasters, such that it is impossible to have perfect protective measures against all of them. The causes of a disaster to the IT infrastructure can either be natural or man-made. Natural disasters are those that result from environmental hazards or acts of nature; these include blizzards, wildfires, hurricanes, volcanic eruptions, earthquakes, floods, lightning strikes, and even asteroids ...

Get Cybersecurity – Attack and Defense Strategies - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.