What is Natural Disaster in Information Security?


A disaster is described as a sudden misfortune that is disastrous to an undertaking. Natural disasters contains all types of severe weather, which have the potential to pose an essential threat to human health and safety, property, demanding infrastructure, and homeland security.

Natural disasters appears both seasonally and without warning, subjecting the nation to frequent time of insecurity, disruption, and monetary loss. These resources serve to prepare IHEs for several natural disasters, such as winter storms, floods, tornados, hurricanes, wildfires, earthquakes, or any combination thereof.

There are specific natural disasters can severely damage the computer system directly, or avoid its operations. These includes are as follows −

  • It can be local flooding such as fracture of air conditioning or water cooling equipment.

  • It can be local landslide, earth quake, subsidence, etc.

  • It is used to exceptional weather conditions.

Civil Unrest − Electronic system can be famous targets for attack by politically motivated team and individuals as well as by mobs. It is offensive that an electronic system site should be in vicinity with −

  • It is unusually high risk of mob violence.

  • It is unusually high incidence of criminal and malicious damage.

  • It is unusually high risk terrorist activity.

If such a site is unavoidable, more levels of physical security can be appropriate.

Computer Terrorism − Computer terrorism is the act of destroying or of corrupting computer systems with an objective of destabilizing a country or of using pressure on a government. It is the act of doing something designed to destabilize a country or to use pressure on a government by using methods defined in the category of computer crimes.

It is applicable to carry out three types of actions against an information system, such as physical, syntactic attack and semantic attack −

  • The physical attack includes damaging equipment in a traditional method, bomb, fire, etc.

  • The syntactic attack includes changing the logic of the system to introduce delays or to produce the system unpredictable. An attack by means of a virus or of a Trojan horse is contained in this category.

  • The semantic attack is higher perfidious. It exploits the confidence that the users have in their system. It includes modifying information that is entering or exiting the system without the user knowledge to induce errors.

Disaster recovery depends upon the replication of data and computer processing in off-premises areas not influenced by the disaster. When servers go down because of a natural disaster, equipment failure, or cyber-attack, a business is required to recover lost records from a second area where the data is backed up. An organization can send its computer processing to that remote area as well to continue operations.

Updated on: 03-Mar-2022

1K+ Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements