Organization’s Business Continuity in Cyberspace
At present the reliable and efficient infrastructure of any organization plays an important role, contributes to the preservation and strengthening of its financial stability and economic development, and at the same time concentrates various risks. New risks are associated with the formation of a modern life environment called cyberspace. In the last decade, the risks of cybersecurity violation have acquired the status systemic risks due to a significant increase in possible consequences from their implementation. To conduct business in cyberspace, it is extremely important to develop solutions that eliminate a contradiction between the inability to avoid modern cyberattacks and strong requirement to quickly restore organization’s business processes. The measures implemented to date to minimize the recovery time of the activities of organizations after cybersecurity attacks may not be sufficient. The brief description of a business continuity concept application to cyberspace is given.
KeywordsCyberspace Cybersecurity Cyberattacks Business continuity
This work was supported by the MEPhI Academic Excellence Project (agreement with the Ministry of Education and Science of the Russian Federation of August 27, 2013, project no. 02.a03.21.0005).
- 1.Borodakiy, Yu., Dobrodeev, A., Butusov, I.: Cybersecurity as the main factor of national and international security of the XXI century (Part 1). Cybersecurity issues, vol. 1 (2013) (In Russian)Google Scholar
- 2.Miloslavskaya, N.G., Senatorov, M.Y., Tolstoy, A.I.: Information Security Management Issues Series. In: Volume 3: Information Security Incident and Business Continuity Management, 2nd edn., vols. 5, 170 p. Goriachaja linia-Telecom, Moscow (2014) (In Russian)Google Scholar
- 3.GOST R 53647.1-2009: Business Continuity Management. Practical guidance. Standartinform, Moscow (2009) (In Russian)Google Scholar
- 4.ISO/IEC 27031:2011 Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuityGoogle Scholar
- 5.ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security managementGoogle Scholar