Assessment item 4 –
Contingency Planning
Benefits of business continuity plan 8
2. Business impact analysis for DR alarms 9
Business Impact Analysis Report 11
Benefits of business impact analysis 12
3. A proposal for incident response plan 12
Incident Response Team Role and Responsibility 13
Benefits for incident response plan 15
Working of cloud backup in disaster recovery 22
Essential Documents and Data Backup 24
Department / Person Responsible 25
Benefits of disaster recovery plan 25
List of figures:
Figure 1: cloud storage 17
List of tables:
Table 1: Backup schedule 18
Table 2: Data retention 19
Table 3: Action plan table 20
Table 4: Roles and Responsibilities 23
Table 5: Communication plan 25
Table 6: Action Plan 25
DR alarms has been facing some cyber-attack issues. It is concerned about the potential losses of designing new IoT monitoring devices. This report shows the implementation process of BCP at DR alarms as per the concern of engineering manager. In this report a proposal will developed for business continuity plan (BCP) in DR Alarms. Needs for the business continuity plan are discussed in this report. The contingency plan should include the recovery time of 2 hours and recovery point objective of 4 hour. In this report best solutions are discussed through BCP and disaster recovery proposal as DR Alarms have not any policy regarded disaster recovery plan. A proposal will be developed for incident response plan, a back plan and a disaster recovery plan. BCP proposal has beinten included theirs needs, business impact, incident response, backup and disaster recovery. A justification is given for risk management and assess IT risks in the term of business. Risk management approaches are discussed to compare and contrast the advantages of each approach. These approaches will help to risk mitigation in the DR alarms. BCP will help to outline all the potential impact in any disaster situation and helps in quick business recovery to do usual function.
Business continuity plan is a process which involve the creation of presentation and recovery of system from potential threats of company. This plan ensures a personal and asset of protection that are able to quick function in a disaster situation. A BCP plan as a general conceive that involve inputs which is belongs to stakeholders (Phillips & Tanner, 2019).
Business continuity plan defines all the risks that could affect the DR alarm’s operations, which makes important part of DR alarm’s risk management strategies. These risks can include natural disasters like flood, fire or other relevant events and cyber-attacks. After identifying these risk BCP will include-
Determination of how cyber-attacks will affect operations in DR alarms.
Implementation of safeguards and mitigation procedure of risks in DR alarms.
Testing procedure for data backup to ensure they work.
Recheck the whole process to ensure it is up to date (AlDairi, 2017).
BCP is an important part for DR alarms. If any disruptions and threats are occurring in DR alarms then it means losses of revenue and high costs will affect the portability (Ahmadian et al., 2020).
To know business failure
BCP has required by DR alarms to mitigate the effects of hard market which has never been predicted. This plan provides surety for business recovery in a fast process and help to remove major downtimes in the ongoing projects of DR alarms.
Losses incurred
In downtime of DR alarms, it may become tough to raise marketing trends in business. To prevent these type of losses BCP can help in the downtime. It gives a backup plan, in case business faces some difficulties. If any business plan is required, it prevents from more losses and boots in the business. It allows to breaking in a considering if situation is stabilized (Kure, Islam, & Razzaque, 2018).
Anticipate catastrophes
Natural disaster may happen in anytime, there is no limit for that. There are variety of problems that occurs in nature which may strike DR alarms and cripple it. In this time, DR alarms can face a myriad of problems in software or hardware hacking to destroy mechanisms in DR alarms. It aims of destruction of material remuneration and pride. To prevent these difficulties, it is required to engage the disaster planning which measures the implementation of assist in business (Niemimaa et al., 2019).
Recovery from malware attacks and different viruses
In some cases, if DR alarms exposes their business in basis of huge customers, competition always occurs and then difficult one would be lead in malicious behavior. So, on that time business contingency plans will ensure that DR alarms can recover their lost data or can segment their information, even if there is a case of crippling threat. This plan has backup solutions to recover threats of malwares which may have made business losses in millions.
Customer protection
One of the most valuable assets is customer protection, DR alarms have to protect their customers when it’s time to visit business premise or after they leave premise. At the time of leave, customer will have to leave their information. Customer should have safeguarded that data to save the information from falling in wrong hands. At these times contingency plan would help to the customer in case they are facing any threat in DR alarms.
Enhancement of competitive spirit
In case there is any general attack in the DR alarms space, authority can have control power and managing power in their hands as per concern customer’s needs. It is considered that all customer wants a secure and stable business, so in case they want any assurance against to protect the data, they will show more interest in DR alarms.
To maintain employee determination
It is the matter of the customer’s comfort with their decision for the management, they would show more interest in achieving the objectives. Once the employee has assurance of their safety in availability of the contingency plan, they will have more determination and enthusiasm for their work. So, the overall result will help to improve the productivity at DR alarms (Rezaei Soufi, Torabi, & Sahebjamnia, 2019).
Provide better communication
Communication is considered as pillar of any organization including the success of that business. It considered as the growth of the organization as well as it will become the growth of DR alarms. An effective plan in DR alarms will ensure the employee that they are directly effective on their performance during the time of crisis.
Enhance company reputation
Effective planning ensures all the employees that they are well informed about all fronts of their behavior and reactions. By these planning customers will able to depend on DR alarms for the suitability of managing situation in effective manners (Hamid, 2018).
Keep the business on trading in time of incident
Operation recovering fast after any interruption
Cost reducing in time of disruption
Risk mitigation
Financial exposure
Company reputation in safe guard
Customer confidence building (Rezaei Soufi, Torabi, & Sahebjamnia, 2019).
To find potential risks in various sectors including information system failure and hacking events.
To create prevention and recovery systems of DR alarms from different threats and natural disaster on cyber-attacks.
To protect asset and personnel to make sure quick functionality and disaster strikes.
To ensure that there are no weaknesses which is to be identified and corrected (Phillips & Tanner, 2019).
Business continuity plan must include the protection of assets of firms and their customers who will capable for provide to resume the effective operations at the level and in the specific time period. It allows to meet it as legal and regulate requirements.
To predict all the consequences in disruption for business functions and other related functions. To gather needed information for development of recovery strategies. Losses prevention in any situation or in disaster condition of DR Alarms which should be identified in the period of risk assessment.
Business impact analysis used identifies all the activities associated with sensitive time and sensitive resources. It helps to estimate the impact which has related to DR alarm’s services and products.
Business impact analysis included in systematic process which determines and evaluates potential effects in any interruption of critical operations of any business, considered is as a result of any disaster or any accident or an emergency. Business impact plan has included in essential element of DR Alarm’s business continuity plan.
A business impact analysis helps to predict all the consequences in disruption in DR alarm’s various functions and processes. It helps to gather information that are needed for development of recovery strategies. It would take cares of potential scenarios losses identification of a risk assessment (Rezaei Soufi, Torabi, & Sahebjamnia, 2019).
It is a process for determining criticality of a business functionality and related resources that are required to ensure the operational resilience or operation continuity during any disruption. It includes five elements-
Executive sponsorship
Understands the organization
Tools for BIA
Processes for BIA
Findings for BIA
It has exploratory component for the process of revealing any planning component in developing strategies for minimizing risks. A business could spend more than two times as much in marketing in any disaster event, this business impact analysis would help rebuild the customer confidence. It would help in establishing recovery of strategies and requirements of resources and time (AlDairi, 2017).
Application name: risk assessment |
Department name: security department |
Application description: General Ledger |
Participating department personnel: XXX |
No. |
Application criteria |
Criteria description |
1. |
Cycles |
Daily |
2. |
Volume |
Information transection. |
3. |
Maximum time in business process that could be deferred in a disaster event and recover the system inoperable: Description of consequences: |
In case of inoperable system, ability of accounting process transmission has lost completely. : Staff members has limited to generate hard copies to data entry preparation. |
4. |
Alternative method: Description of alternative method: |
Manual process is not a better alternative, there is multiple departments. : Encryption of cloud backup on personal device. |
5. |
Number of days in alternative process performance: Describe consequences: |
0 : Data can be encrypted by outer sources. |
6. |
Other departments impact: Describe consequences: |
Payment and purchasing function that would be restricted in different ways. : System will become more complex. |
7. |
Revenue the impact of result in not performing business process which is related to the critical application: Describe consequences: |
Shut down operation, cease all revenue operating. : Security issues can be raised. |
Business Unit Name – BU
Recovery Time Objective – RTO
Recovery Point Objective – RPO
Parent Process Depends On – RP Depends on
Parent Process Required By – PP Required by
BU Name |
Head Count |
Parent Process |
Priority Ranking |
RTO |
RPO |
PP Depends on |
PP Required by |
DR Alarms |
10,000 |
Network security |
Critical |
2 hour |
4 hour |
Security policy |
DR Alarms |
Sub-Process |
Priority Ranking |
RTO |
RPO |
SP Depends on |
SP Required by |
Quantitative Impact |
Cyber security |
Critical |
2 hour |
4 hour |
Engineering manager |
Business continuity practices |
$46,980 |
|
Time Needed to Recover Staff |
|||||
Qualitative Impact |
< 4 hrs |
1 day |
3 days |
1 week |
2 weeks |
> 2 weeks |
Lost data |
200 |
150 |
125 |
100 |
50 |
40 |
|
Technology / Services Recovery Time |
|
|||||
Recovery Strategy |
< 4 hrs |
1 day |
3 days |
1 week |
2 weeks |
> 2 weeks |
Comments |
Cloud Backup |
150 |
125 |
100 |
50 |
40 |
30 |
Advances data recovery tool |
Highest recovery procedures
Priority ranking in order of recovery
Priority in the business continuity plan
Helps in measurement of business continuity plan testing effectiveness
Gives a rational approach to backup rotation
Cyber-attacks can be prevented in DR alarms by considering it as emphasized anticipation, adaptation and agility in security analysis. With the help of incident response program, cyber-attacks can be mitigated or can be avoided altogether. System engineering and Enterprise architecture should be based on assumption of component which are made to be compromised. In addition, missions and functions of business must be continued to operate even in the presence of these compromises (Kure, Islam, & Razzaque, 2018).
Being protective in DR alarms to better react with deep understanding for threats of actor’s intensions and DR alarms risk related to potential threats.
A cyber security incident response plan includes all the instruction that are designed to help DR Alarms for detecting, responding and recovering it from network security incident. DR plans are the technology-centric and help to address the issues such as malware detection, data theft or any service outages (Mendhurwar, & Mishra, 2019). A cyber-attack can affect DR alarms across function in different ways, this incident response plan should also encompass in other areas like finance, HR, customer services, communications, insurances, local authorities and many other entities (AlDairi, 2017).
The security incident plan should be considered as ongoing basis within a living document including recurring detection and other activities of responses such as threat hunting, cyber-attacks, incident response and other recovery. Performing of the incident response activity, will help in improving IT security hygiene and in protecting DR alarms from the known threats, unknown attackers, data breach prevention (Ahmad et al., 2020).
It has purpose of establishing and clearing testing measurement in DR alarms. It also helps to reduce the impacts of any breach in internal or external threats. Incident response plan is considered as part of successful security program.
Incident response plan is the set of tools and all the procedures that can be helps the security team of DR alarms which will help to identify, recover, eliminate from potential threats of cyber-attacks. It designed for help to quick respond and uniformly in against to the external threats.
Each of the following areas will have a primary and alternate member:
Information Privacy Office (IPO)
Information Security Office (ISO)
Network Architecture
Information Technology Operations Center (ITOC)
Operating System Architecture
Information Security Office
It determines that, which member has Incident Response Team, play an active role for investigation in DR alarms.
It determines scope and nature of any incident
It contacts for qualified information of security specialist as according to requirement.
Contacts for members in Incident Response Team.
It monitors for progress of investigation.
It provides proper training for incident handling in DR alarms.
It escalates to management as in appropriate manner
Contacts for auxiliary departments
It ensures that evidence gathering, preservation and chain of custody is appropriate
Information Technology Operations Center
It provides notifications to chief information security office for activation of incident response team DR alarms.
It provides central points of contact for each incident.
Information Privacy Office
It assists the appropriate developing communications for impacted parties.
It coordinates with activities of Information Security Offices of DR alarms.
It provides documents for types of personal information which may be caused for a breach in DR alarms.
It assesses the need for changing the privacy policy, practices and procedures as a product of the breach in DR Alarms.
It provides guidance of investigation for issues which has related to the privacy of customers and the employee’s personal information in DR alarms.
Network Architecture
It takes actions which are necessary for block traffics that are came from suspected intruder.
Provides analyzation of network traffic to signs of denial a service which has distributed in denial of service and other external attacks in DR alarms.
It looks for signs in a firewall breach.
It has runs of tracing tools like sniffers, event loggers and Transmission Controls Protocol (TCP) ports monitors.
It has contacts of external Internet service provider in assistance for handling any incident in DR alarms (Ghafur et al., 2019).
Operating System Architecture
It examines the system log in critical system of unusual activity in DR alarms.
It ensures the service pack and the patch which has currents on the mission-critical computer in DR alarms.
It also ensures the backup in place of all critical system.
Crime prevention.
Reduces the investigation costs.
Increases confidence of investors and clients
Penalty avoidance
Targets the security monitoring
To reduce the risk in data loss, employee wants backup for their files and other databases, they also want backup in their operating system, applications etc. In case employees using virtualization then they will consider their host as back up and management console backup. If any employee using cloud infrastructure as a service, then employee will include it their scope.
DR alarms wants to back up their critical data in their organization, to make it key component in DR alarm’s disaster recovery plan or business continuity plan. DR alarms and their employees are very dependent on data, it is like a life source for the business, without it they cannot be survive. A company needs the backup plans and disaster recovery plans or other they will not survive in disaster.
DR Alarms should design a backup plan to handle the whole backup strategy and their solutions and required tools, scope for the backup, their scheduling, infrastructures, storage and network, recovery point objective (RPOs) and recovery time objective (RTOs).
Employees continuously change the data and in case of disaster time, data creates the latest form of backup and at the moment data failure will be lost, this is called recovery point objective, the maximum period for that employee have to lose the data on the system because of the disaster (Genç, 2017).
Shorter RPO demotes less data losing and requires more data backups and strategy capacity. Employee requires more network resources and computing resources to rum the backup. Longer RPO denotes more affordable and more data losing.
4 hours backup needs daily backup in DR alarms. Which requires modern solutions like cyber backup plans that can easily implemented of RPO by an employee in few minutes shorter RPOs will be considered as critical system and longer RPOs considered as secondary system.
Another variable is recovery time objective (RTO); this shows the speed of data recovering at the time of disaster to return from it in the normal operation. In case systems of DR alarms are in down condition, DR alarms can loss their money and a team need to recover it as fast as possible to minimize the data. Same as RPO, shorter RTO requires faster storage, technologies and networks and also need more expenses (Alshammari et al., 2018).
Cloud computing has completely changed the whole industry in the field of data protection. Cloud backup is most popular method for data storage with respect to information protection. Cloud backup is highly efficient as an alternative of traditional strategies.
Cloud storage, a model of data storage which is able to access, store and manage data in remote cloud server through internet. In DR alarms, employee can access their data in any time as per their requirements. It has some characteristics like, fully responsible in back end support, self-service based, elastic that depends on customer’s need, can be accessed at any time, can be shared by multiple users and calculates only resources for each user (Alshammari et al., 2018).
(Source: Reed, 2018)
Cloud backup has three types, public clouds, hybrid cloud, and private cloud. Public cloud has lower cost, on-demand scalable, multitenant implementation and it is perfect to store unstructured and sensitive data. Hybrid cloud has cost effective and smoothly transfer data among systems. Sensitive data or information can be hacked in the hybrid cloud backup. It the combination of cloud storages which has benefits of environment. Private cloud backup is too expensive, customized, data security on high level and safety. It has direct management in the organization would be helpful for DR alarms as well as. It has single tenant implementation. Private cloud has confidential storage for data and component of mission- critical (Pettit, Croxton, & Fiksel, 2019).
Purchase the process of cloud backup
Install software in the IT system
Choose the folders, application file to backup
It shows the periodicity in backups. In this section backup cover is done at the remote location through service provider.
Objective |
Backup plan |
Security plan |
Completion time |
Primary objective |
It provides business continuity plan after the disruption. |
Data asset after data breach |
On daily basis. |
Response requirement |
Communication with stakeholder |
Evidence collection and preservation |
Before a process has been started. |
Tactical different |
Accuracy and recovery |
Prevention for future loss |
After completion of process. |
Plan management |
Best practices and learned lesson |
New cyber security threats and modification |
Before going to next process. |
Data recovery will able to go on process once credentials have been provided, so after these credentials has been provided then browser forward it to the cloud storage, then employee or anyone will click on the name of a machine to retrieve data.
Software will show disk level and file level archives of the data of this machine.
User will click the required data, if it is promoted then enter the archived password.
After that software will show all the folders and files for archive, user will find their file and folders for recovery.
User have to browse for recover that data folder.
Or use have to search the list of folders and files.
User have to select any file or folder to recover
Then user have to click on download
Then user have to select a location to save archived data (Kumar, Raj, & Jelciana, 2018).
Employee data |
Retention period |
Under 18 years |
4 years |
For collective redundancies |
4 years |
Parental leave |
9 years |
Records for tax |
7 years |
No. |
Action |
Who Performs (Responsible person) |
1. |
Review the program in IT management which secure approvals required accordingly. |
Head of IT Ops and Data backup admin of DR alarms |
2. |
Identifies the data for backup |
Backup admin, backup team of DR alarms |
3. |
Identifies systems to backup |
Backup admin, backup team of DR alarms |
4. |
Identifies other resources for back up |
Backup admin, backup team of DR alarms |
5. |
Schedules backup activity |
Backup admin, backup team of DR alarms |
6. |
Programs backup system and resource according to the schedules and policies |
Lead Backup admin, backup team of DR alarms |
7. |
Schedules rotation activities and tape backups |
Backup admin, backup team of DR alarms |
8. |
Executes backup of data, system and other resource |
Backup admin, backup team of DR alarms |
9. |
Ensures, tape is secured for pickup and properly labeled |
Backup admin, backup team of DR alarms |
10. |
Verifies, backup was completed and all backed-up resources has been unchanged |
Backup admin, backup team of DR alarms |
11. |
Prepares and distributes backup reports |
Backup admin, backup team of DR alarms |
12. |
Schedules and conducts the test of data backup |
Backup admin, backup team of DR alarms |
13. |
Schedules and performs the patching in backup resources |
Backup admin, backup team of DR alarms |
14. |
Updates technologies and backup systems as needed |
Backup admin, backup team of DR alarms |
This backup plan can be applicable for employees and all office members as well as to corporate records.
Less downtime
Gives quick access to a file
Provides protection against the power failure
Add anti-viruses to protect data
Gives recovery from operating system failure
To help in recovery, prevention, and repairing from potential threats which are affecting DR alarms. DRP focuses on advance technologies. It provides instructions for responding during period of disaster. These disasters have included cyber and environment relevant events. It also has focus on gathering information and decision-making coordination to understand any specific situation (Schätter et al., 2019). The purpose of the disaster recovery plan for cloud back and cyber security, to ensure that DR alarms has prepared to respond in case of a disaster and in case of any emergency, |
To recover from disaster for cyber security, it includes quick availability of resources in restoring of data and information system. A disaster can classified in some terms like sudden events, natural disaster, and wide scoping, detrimental damages. In risk management of information system, disaster recovery plan helps in critical subset of larger entity in DR alarms business continuity plan.
|
Goal of the disaster recovery plan is to save DR alarms in disaster condition or any treat condition. To ensure that DR alarms can respond in during of disaster and other emergency that affects systems of DR alarms and minimizing the risks such as cyber-attacks. To provide cyber backup in DR alarms and recovery from data lost in any disaster condition or down time of DR alarms. |
Disaster recovery plan also involves some other points like how it differs from any traditional recovery plan, how cloud back works, how cloud backup and cyber security etc. There is some exclaimed view to recover data by help of cloud backup and cyber security. Traditional plans involve remote plans, which requires daily backup and maintenances in support part. In the condition of protection of data and recovery from disaster needs manual performance. Due to these reasons, it can be time consuming and source sensitive process. Cloud backup stores critical data and files in cloud storage and failing it over the secondary site to prepare for disaster events. Cloud backup provides a pay as you go based approach that able to access from anywhere and anytime. Back and disaster recovery in cloud backup has automated and needs minimum inputs in the parts (Sanchis, & Poler, 2019).
It would create, test and update a disaster recovery plan in DR alarms to prepare it in case of hacking or cyber-attacks. It would provide a safety and continuity it the business and networking in the business. It would take the account inn infrastructure condition, recover it from potential treats, and provide disaster recovery strategies. In the disaster condition it would allow to design a DR plan which has automate power to each step of a recovery process. Traditional backup plans would be more complex as compare it the cloud backup, it has more advances techniques to make a recovery process easy. In other way traditional backup plans requires more maintenance and support of a physical disaster recovery plan and that would be more expensive and more time consuming. Cloud backup has more facilities to maintain backup data and it would help to DR alarms to face disaster events (Phillips, & Tanner, 2019).
Roles and responsibilities show the working area, departments, related works of authorities and employees in the DR alarms.
Person Responsible |
Contact Details |
Role |
Responsibilities |
Managing director |
[Email] [Phone] [Mobile] |
Recovery Process Lead |
Oversees and manages the execution of disaster recovery plan in DR alarms |
Engineering director |
[Email] [Phone] [Mobile] |
Contact Person for cyber security department |
|
Manager |
[Email] [Phone] [Mobile] |
Communication Lead |
|
Table 4: Roles and Responsibilities
Assets and resources provide identification and management tools of system in DR alarms. It includes security management software, vulnerability scanning tool and active and passive networking solutions of monitoring.
Natural or land resources Labor or human resources Capital or machinery resources Entrepreneurship |
Insurance policy for cyber security generally applied for the business’s liability during data breach including sensitive customer data like security keys, credit card number, their account number, driving license number and any health records.
This policy will be used by individual person, employee will back up their data on daily basis. This policy would be help to recover risks of fraudulent and data theft, cyber-attacks, malware attacks, cyber stalking and social media liabilities (Nawari, & Ravindran, 2019).
It would recover all the risks that are associated with information technologies. It will collect personal information of customers and financial data on their server (Svilicic et al., 2019). |
Cyber security requires qualifications like degrees in computer science, information technology and system engineering or another related field. It also requires some experience in field of cyber security such as detection of incidents, forensics and responses (Nachiappan et al., 2017).
USB stick – storage device External hard drive – storage device Cloud storage – at cloud server Time machine – use as a hard drive for mac users Network storage – backup file to network attached storage Printing – hard copy |
Communication plan defines the need for being aware of and informed about any project. It shows the process that how an information will distribute and who will responsible for that. It is a main part of any risk management plan (Kache, & Seuring, 2017).
Role |
Task |
Contact |
Engineering director |
Set codes and instructions |
Email ID |
Managing director |
Risk management |
Email ID |
Security manager |
Set prevention goals in any disaster situation |
Email ID |
For action plan it is needed to clear backups that provides copy of data and solutions to recover them in various situations. It stores a second copy of important files and important data to provide a safe backup for that data and files.
Task / Procedure |
Status |
Risk minimization |
In progress |
Identify sensitive data |
In progress |
Inventory of hardware and software |
In progress |
Crisis communication plan |
In progress |
Cost efficiency.
Better understanding in scalability.
Increase the productivity of employment.
Increase the customer retention.
Cloud backup has a top position at this time, which is best option to back data of any business or organization, it would be helpful for DR alarms also. A proposal to develop a Business continuity plan for DR alarms has been developed in this report. BCP plan has so many benefits and it will provide protection to DR alarms in threat prevention from cyber-attacks. It will help in finding risks that are affecting DR alarms in event of cyber-attacks and any other natural disaster. It has benefit to providing risk mitigation which has risk management strategies. Needs of a business continuity plan has been discussed in this report. With BCP in DR alarms there has been also discussed the business impact analysis for DR alarms, a proposal for incident plan, backup plan to recover the lost data and disaster recovery plan has been discussed with their purpose and scopes for each. Risks have been found and discussed properly in this report and required solutions have been discussed. These plans would help DR alarms in down times and provides suitable data backup concept and new advanced technologies with benefits. There is cloud backup approach is suggested in this report which provides backup methods and recovery methods to recover data losses. There is also a recommendation for cyber security that each employee of DR alarms should have limitation on social network.
Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953. https://doi.org/10.1002/asi.24311
Ahmadian, N., Lim, G. J., Cho, J., & Bora, S. (2020). A quantitative approach for assessment and improvement of network resilience. Reliability Engineering & System Safety, 106977. https://doi.org/10.1016/j.ress.2020.106977
AlDairi, A. (2017). Cyber security attacks on smart cities and associated mobile technologies. Procedia Computer Science, 109, 1086-1091. https://doi.org/10.1016/j.procs.2017.05.391
Alshammari, M. M., Alwan, A. A., Nordin, A., & Abualkishik, A. Z. (2018). Disaster recovery with minimum replica plan for reliability checking in multi-cloud. Procedia computer science, 130, 247-254. https://doi.org/10.1016/j.procs.2018.04.036
Genç, R. (2017). The importance of communication in sustainability & sustainable strategies. Procedia Manufacturing, 8, 511-516. https://doi.org/10.1016/j.promfg.2017.02.065
Ghafur, S., Kristensen, S., Honeyford, K., Martin, G., Darzi, A., & Aylin, P. (2019). A retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ digital medicine, 2(1), 1-7. https://doi.org/10.1038/s41746-019-0161-6
Hamid, A. H. A. (2018, January). Limitations and challenges towards an effective business continuity management in Nuklear Malaysia. In IOP Conference Series: Materials Science and Engineering (Vol. 298, pp. 1-11). doi:10.1088/1757-899X/298/1/012050
Kache, F., & Seuring, S. (2017). Challenges and opportunities of digital information at the intersection of Big Data Analytics and supply chain management. International Journal of Operations & Production Management. https://doi.org/10.1108/IJOPM-02-2015-0078
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697. https://doi.org/10.1016/j.procs.2017.12.089
Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences, 8(6), 898. https://doi.org/10.3390/app8060898
Mendhurwar, S., & Mishra, R. (2019). Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges. Enterprise Information Systems, 1-20. https://doi.org/10.1080/17517575.2019.1600041
Nachiappan, R., Javadi, B., Calheiros, R. N., & Matawie, K. M. (2017). Cloud storage reliability for big data applications: A state of the art survey. Journal of Network and Computer Applications, 97, 35-47. https://doi.org/10.1016/j.jnca.2017.08.011
Nawari, N. O., & Ravindran, S. (2019). Blockchain and building information modeling (BIM): Review and applications in post-disaster recovery. Buildings, 9(6), 149. https://doi.org/10.3390/buildings9060149
Niemimaa, M., Järveläinen, J., Heikkilä, M., & Heikkilä, J. (2019). Business continuity of business models: Evaluating the resilience of business models for contingencies. International Journal of Information Management, 49, 208-216. https://doi.org/10.1016/j.ijinfomgt.2019.04.010
Pettit, T. J., Croxton, K. L., & Fiksel, J. (2019). The evolution of resilience in supply chain management: a retrospective on ensuring supply chain resilience. Journal of Business Logistics, 40(1), 56-65. https://doi.org/10.1111/jbl.12202
Reed, J. (2018). Redirecting. Doi.org. Retrieved 22 January 2021, from https://doi.org/10.1016/j.jnca.2017.08.011.
Rezaei Soufi, H., Torabi, S. A., & Sahebjamnia, N. (2019). Developing a novel quantitative framework for business continuity planning. International Journal of Production Research, 57(3), 779-800. https://doi.org/10.1080/00207543.2018.1483586
Sanchis, R., & Poler, R. (2019). Enterprise resilience assessment—A quantitative approach. Sustainability, 11(16), 4327. https://doi.org/10.3390/su11164327
Schätter, F., Hansen, O., Wiens, M., & Schultmann, F. (2019). A decision support methodology for a disaster-caused business continuity management. Decision Support Systems, 118, 10-20. https://doi.org/10.1016/j.dss.2018.12.006