Abstract
Comprehensive BCM plan testing for complex information systems is difficult and expensive, if not infeasible. This paper suggests that a simulator could be employed to ameliorate these problems. A general model for such a BCM simulator is presented, and the implementation of a prototype simulator is described. The simulator reacts to system disturbances by seeking alternative configurations provided within the BCM plan, reporting the resource availabilities in the updated system and identifying any failure to meet the requirements placed on the system. The simulator then explores any changes in data security introduced by the proposed post disturbance configuration and reports any enhanced risk.
Chapter PDF
Similar content being viewed by others
Keywords
References
Musson, D., Jordan, E.: Managing for Failure – The Macquarie University Survey of Business and Computer Contingency Planning in Australia, Macquarie Graduate School of Management, Australia (2002)
Australian National Audit Office: Business Continuity Management (August 2000)
Australian Standards HB292-200: A Practitioner’s Guide to Business Continuity Management (January 2006)
Kwok, L., Longley, D.: Security Modeling for Risk Analysis. In: Proc. 18th IFIP World Computer Congress, IFIP 2004, Toulouse, France, August 22-27, pp. 29–45 (2004)
Branagan, M., Caelli, W.J., Lam-for Kwok, Longley, D.: Feasibility of Automated Information Security Compliance Auditing. In: Proc. IFIP TC 11 23rd Int. Information Security Conf, Milan Italy, September 2008, pp. 493–507 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Caelli, W.J., Kwok, LF., Longley, D. (2010). A Business Continuity Management Simulator. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds) Security and Privacy – Silver Linings in the Cloud. SEC 2010. IFIP Advances in Information and Communication Technology, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15257-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-15257-3_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15256-6
Online ISBN: 978-3-642-15257-3
eBook Packages: Computer ScienceComputer Science (R0)