首页> 美国政府科技报告 >Homeland Security -- Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
【24h】

Homeland Security -- Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

机译:国土安全 - 减少公共和私人信息基础设施遭受恐怖主义的脆弱性:概述

获取原文

摘要

This report assesses the impact of the September 11, 2001 attacks on public and private information infrastructures in the context of critical infrastructure protection, continuity of operations (COOP) planning, and homeland security. Analysis of the effects of the terrorist attacks suggests various lessons learned. These lessons support three general principles. The first principle emphasizes the establishment and practice of comprehensive continuity and recovery plans. One lesson learned in this area is to augment disaster recovery plans. Businesses and agencies, who now must consider the possibility of complete destruction and loss of a building, may need to augment their disaster recovery plans to include the movement of people, the rapid acquisition of equipment and furniture, network connectivity, adequate workspace, and more. A corollary to this lesson learned is the need to assure that recovery procedures are well-documented and safeguarded so that they can be fully utilized when necessary. A second lesson is the need to back up data and applications. Without a comprehensive backup system that captures more than just an organization's data files, a significant amount of time can be lost trying to recreate applications, organize data, and reestablish user access. A corollary to this lesson learned is the need to fully and regularly test backup sites and media to ensure their reliability and functionality. The second principle focuses on the decentralization of operations and the effectiveness of distributed communications. Industry experts suggest recovery sites be located at least 20-50 miles away from the primary work site. Another lesson in this area is to ensure the ability to communicate with internal and external constituencies. The third principle involves the institutionalization of system redundancies to eliminate single points of weakness. The lesson of employing redundant service providers is applied primarily to telecommunications services.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号