• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

打破业务连续性与网络安全之间的壁垒。

Breaking down silos between business continuity and cyber security.

作者信息

Phillips Rick, Tanner Brandon

出版信息

J Bus Contin Emer Plan. 2019 Jan 1;12(3):224-232.

PMID:30857581
Abstract

Every year, most businesses experience a cyber attack of some sort. Despite the fact that these attacks can interrupt business operations, many organisations lack an effective business continuity response. While some organisations do have cyber security and incident response functions in place, they focus more on mitigating the attack itself than on ensuring business operations can continue in the interim. To understand why it is important to integrate cyber security into the business continuity plan, business continuity planners must first be familiar with the common cyber threats organisations face as well as the far-reaching impact of data breaches. Then, they must address the root causes of the breakdown between business continuity and cyber security: the lack of a security culture, boardroom support and a coordinated response. Practical steps for integrating cyber security into the business continuity response include starting a conversation with those responsible for cyber security, determining the appropriate response to cyber incidents, assessing the organisation's recovery needs and testing the response strategy. Ideally, however, organisations should prevent attacks altogether. As employees are often the primary point of failure in cyber security preparedness, organisations should improve their cyber security posture by investing in education and awareness from the top down.

摘要

每年,大多数企业都会遭遇某种形式的网络攻击。尽管这些攻击会干扰业务运营,但许多组织缺乏有效的业务连续性应对措施。虽然一些组织确实具备网络安全和事件响应功能,但它们更多地关注减轻攻击本身,而不是确保业务运营在此期间能够持续。为了理解将网络安全纳入业务连续性计划为何重要,业务连续性规划者首先必须熟悉组织面临的常见网络威胁以及数据泄露的深远影响。然后,他们必须解决业务连续性与网络安全之间脱节的根本原因:缺乏安全文化、董事会支持和协调一致的应对措施。将网络安全纳入业务连续性应对的实际步骤包括与负责网络安全的人员展开对话、确定对网络事件的适当应对措施、评估组织的恢复需求以及测试应对策略。然而,理想情况下,组织应完全预防攻击。由于员工往往是网络安全防范中的主要薄弱环节,组织应自上而下地通过投资教育和提高意识来改善其网络安全态势。

相似文献

1
Breaking down silos between business continuity and cyber security.打破业务连续性与网络安全之间的壁垒。
J Bus Contin Emer Plan. 2019 Jan 1;12(3):224-232.
2
Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.网络安全:对面临网络攻击风险的组织在信息共享与数据敏感性问题方面的批判性审视。
J Bus Contin Emer Plan. 2013;7(2):103-11.
3
Enhancing infrastructure resilience through business continuity planning.通过业务连续性规划提高基础设施恢复力。
J Bus Contin Emer Plan. 2017 Jan 1;11(2):163-73.
4
Building capability and community through cyber-incident response exercises.通过网络事件应对演练来建立能力和社区。
J Bus Contin Emer Plan. 2024 Jan 1;18(1):49-58.
5
Business continuity strategies for cyber defence: battling time and information overload.网络防御的业务连续性策略:应对时间和信息过载
J Bus Contin Emer Plan. 2010 Nov;4(4):303-16.
6
Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?网络犯罪:标准风险分析能否帮助应对业务连续性管理人员面临的挑战?
J Bus Contin Emer Plan. 2013;7(2):126-37.
7
Preventing a data breach from becoming a disaster.
J Bus Contin Emer Plan. 2013 Summer;6(4):295-303.
8
Strategic dilemmas when managing cyber attacks.管理网络攻击时的战略困境。
J Bus Contin Emer Plan. 2024 Jan 1;17(4):323-335.
9
Using agility to combat cyber attacks.运用敏捷性应对网络攻击。
J Bus Contin Emer Plan. 2017 Jun 1;10(4):298-307.
10
Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.构建组织的网络弹性:基于战略知识的网络安全管理视角
J Bus Contin Emer Plan. 2015;9(2):185-95.

引用本文的文献

1
A practical cyberattack contingency plan for radiation oncology.一份针对放射肿瘤学的实用网络攻击应急计划。
J Appl Clin Med Phys. 2020 Jul;21(7):181-186. doi: 10.1002/acm2.12886. Epub 2020 Apr 24.