Skip to main content

The Virtual Machine: A Tool for Business Continuity Planning

Disaster recovery, or business continuity planning, is an ever-increasing issue for IT personnel. Why? Well, try to name a company that is beyond dependence on computer and internet technology to maintain a viable business. O.K., besides the Benedictine monks who make that great liqueur or Amish farmers.

The fact is, most companies today quickly come to a standstill without email, data servers or workstations. And the reason business continuity planning is increasingly on the radar of IT personnel is that computer systems can be interrupted in so many ways.

First of all, there are interruptions caused by human error, massive power failures or natural disasters.

Secondly, the nefarious, irresponsible individuals and groups who create viruses, trojans, and various kinds of other attacks are relentless in their attempts to create havoc in business systems and on the internet.

Third, thanks to 9/11, our world (the western world) has come to the somber realization that terrorism can happen anywhere.

1450 (PDF, 2.14MB)

15 Aug 2004
ByMoe Calvez
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

2026 Cybersecurity Workforce Research Report by SANS | GIAC

Research Paper

The cybersecurity workforce is at a turning point. AI is transforming how work gets done, regulators are redefining ‘qualified,’ and organizations are recognizing that the right skills, not headcount, are what drive success. As AI reshapes the cyber workforce, this report helps leaders make informed decisions and shows practitioners where skills and careers are heading.

  • 11 Mar 2026
  • SANS Institute, GIAC Certifications

A Startups Guide to Implementing a Security Program

Research Paper

Startups struggle to balance survival with the practical implementation of a security program. There...

  • 8 Oct 2020

Putting it all together through Automation

Research Paper

Most problems faced in Information Security are typically time sensitive. For Forensic Engineers and...

  • 22 Apr 2019

Information Security Best Practices While Managing Projects

Research Paper

To maximize long-term return on investment (ROI) with a project's delivery, taking information...

  • 25 Mar 2019

Logon Banners

Research Paper

Logon banners have been a common feature of operating systems and applications for many years....

  • 20 Mar 2019

Security Considerations for Team Based Password Managers

Research Paper

Password management applications are a common and practical way to store complex passwords. They use...

  • 23 Jul 2018

Content Security Policy in Practice

Research Paper

The implementation of Content Security Policy to leverage web browser capability in protecting a web...

  • 6 Jul 2018

Agile Security Patching

Research Paper

Security Patch Management is one of the biggest security and compliance challenges for organizations...

  • 3 May 2018

Speed and Scalability Matter: Review of LogRhythm 7 SIEM and Analytics Platform

Research Paper

Just how scalable, fast and accurate are SIEM tools when under load? To find out, we put the...

  • 13 Apr 2017
  • Dave Shackleford

Bill Gates and Trustworthy Computing: A Case Study in Transformational Leadership

Research Paper

The notion that IT security is a serious issue is non-controversial. The market for cybersecurity...

  • 20 Sep 2016

Filling the Gaps

Research Paper

There should be an emphasis on the importance of regular internal and external auditing focusing on...

  • 18 Aug 2016

Investing in Information Security: A Case Study in Community Banking

Research Paper

Small businesses, such as community banks, often do not have resources dedicated to information...

  • 12 Aug 2016

Introduction to Rundeck for Secure Script Executions

Research Paper

Many organizations today support physical, virtual, and cloud-based systems across a wide range of...

  • 11 Aug 2016

Using Information Security as an Auditing Tool

Research Paper

As cyber-attacks are gaining visibility within mainstream media, what once was knowledge for...

  • 14 Jul 2016

Applying Data Analytics on Vulnerability Data

Research Paper

Organizations, by law, should exercise due care and due diligence in securing data at rest, in...

  • 23 Dec 2015

Framework for Innovative Security Decisions

Research Paper

Remember the Periodic Table of chemical elements (Dayah, Dynamic Periodic Table, 1997)? It...

  • 3 Nov 2015

Security Data Visualization

Research Paper

The objective of this paper is to provide guidelines on information security data visualization and...

  • 28 Oct 2015

Behind the Curve? A Maturity Model for Endpoint Security

Research Paper

Behind the Curve? A Maturity Model for Endpoint Security

  • 22 Oct 2015

The Sliding Scale of Cyber Security

Research Paper

The Sliding Scale of Cyber Security is a model for providing a nuanced discussion to the categories...

  • 1 Sep 2015

Protecting Third Party Applications with RASP Infographic

Research Paper

Protecting Third Party Applications with RASP Infographic

  • 27 Aug 2015

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.