22 relations: Business continuity planning, Contingency management, Continuity of Operations, Crisis management, Data recovery, Digital continuity, Disaster recovery, Disaster recovery plan, Disaster risk reduction, Firmware, High availability, Information security, Information technology, ISO 22301, Logical Volume Manager (Linux), Microcode, Quality management, Resilience (organizational), Risk management, Service-level agreement, Subnetwork, Virtual LAN.
Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.
Contingency management (CM) is most-widely used in the field of substance abuse, often implemented as part of clinical behavior analysis.
Continuity of Operations (COOP) is a United States federal government initiative, required by U.S. Presidential Policy Directive 40 (PPD-40), to ensure that agencies are able to continue performance of essential functions under a broad range of circumstances.
Crisis management is the process by which an organization deals with a disruptive and unexpected event that threatens to harm the organization or its stakeholders.
In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.
Digital continuity is the ability to maintain the digital information of a creator in such a way that the information will continue to be available, as needed, despite changes in digital technology.
Disaster recovery (DR) involves a set of policies, tools and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.
A disaster recovery plan (DRP) is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.
Disaster risk reduction (DRR) is a systematic approach to identifying, assessing and reducing the risks of disaster.
In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.
High availability is a characteristic of a system, which aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period.
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.
ISO 22301 Societal security -- Business continuity management systems --- Requirements is a management system standard that specifies requirements to plan, establish, implement, operate, monitor, review, maintain and continually improve a documented management system to protect against, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.
In Linux, Logical Volume Manager (LVM) is a device mapper target that provides logical volume management for the Linux kernel.
Microcode is a computer hardware technique that imposes an interpreter between the CPU hardware and the programmer-visible instruction set architecture of the computer.
Quality management ensures that an organization, product or service is consistent.
Organizational resilience is defined as "the ability of a system to withstand changes in its environment and still function".
Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinator and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
A service-level agreement (SLA) is a commitment between a service provider and a client.
A subnetwork or subnet is a logical subdivision of an IP network.
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).