Summary
In this chapter, we have discussed ways in which organizations prepare to ensure business continuity during disasters. We have talked about the DR planning process. We have highlighted what needs to be done to identify the risks faced, prioritize the critical resources to be recovered, and determine the most appropriate recovery strategies.
In this chapter, we have also discussed the live recovery of systems while they remain online. We have focused a lot on contingency planning, and discussed the entire contingency planning process, touching on how a reliable contingency plan needs to be developed, tested, and maintained.
Lastly, we have provided some best practices that can be used in the recovery process to achieve optimal results.
This chapter brings to a conclusion the discussion about the attack strategies used by cybercriminals and the vulnerability management and DR measures that targets can employ. The next chapter will move us into our final section of the...