U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Contingency Planning (From Computer Systems Security, P 295-306, 1981 - See NCJ-88617)

NCJ Number
88627
Author(s)
A C Smith
Date Published
1981
Length
12 pages
Annotation
Security for a computer system must be viewed in terms of systems security rather than computer security and must involve contingency planning.
Abstract
The risk management approach to the security of computer-based systems involves a professional examination of all risks and possible defensive actions, an independence that counteracts vested interests, and skills and information that cannot be implanted in every line manager. Risk management also includes a central position that permits a view across department and company boundaries and an acceptance that policy decisions and overall responsibility rest firmly with top management. Prime security measures are designed to reduce the chance of peril striking at one of the system's component parts. Prime security anticipates the peril, while contingency planning is designed to recover the system after disaster strikes. Its first objective is to restore the system to working order, while its second objective is to have appropriate fall-back facilities. The paper reviews the actions needed for successful recovery and fall-back. It emphasizes the need to consolidate all the defensive strands and analyzes the factors of cost, availability, and timescales influencing the decisionmaking process. Discussion also focuses on the role of emerging shared standby centers and the role of insurance in planning for security. No references are cited.

Downloads

No download available

Availability