Difference between revisions of "Part 1: RAR - List of Threats v2"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
(2 intermediate revisions by 2 users not shown)
Line 2: Line 2:
 
{{Button Back BCM RAR}}
 
{{Button Back BCM RAR}}
 
{{Button Back CC RAR}}
 
{{Button Back CC RAR}}
{{utton Back ITDR RAR}}
+
{{Button Back ITDR RAR}}
 
= <span style="color:#0000FF">'''List of Threats''' =
 
= <span style="color:#0000FF">'''List of Threats''' =
 
This list serves as a set of possible [[Threat|threats]] that could occur to an organization.  It is intended to be used by the various disciplines, starting with business continuity, crisis management, crisis communication and disaster recovery.
 
This list serves as a set of possible [[Threat|threats]] that could occur to an organization.  It is intended to be used by the various disciplines, starting with business continuity, crisis management, crisis communication and disaster recovery.
Line 8: Line 8:
 
{{BCM Series Analyzing and Reviewing}} {{Template:Planning Methodology RAR}}  
 
{{BCM Series Analyzing and Reviewing}} {{Template:Planning Methodology RAR}}  
 
From this list of threats, the [[Organization BCM Coordinator]] together with the BC Team is required to identify and extract the likely and high-impact threats that will affect your organization.  Sometimes, this list of threats may be re-organized into Four primary scenarios of internal and external threats: Denial of Access, Unavailability of People, Disruption of Supply Chain, and Equipment and IT-related Disruption.
 
From this list of threats, the [[Organization BCM Coordinator]] together with the BC Team is required to identify and extract the likely and high-impact threats that will affect your organization.  Sometimes, this list of threats may be re-organized into Four primary scenarios of internal and external threats: Denial of Access, Unavailability of People, Disruption of Supply Chain, and Equipment and IT-related Disruption.
 +
 +
Click to find out more about the {{Types of Crisis Scenarios}}
  
 
== '''[[Crisis Management]] and [[Crisis Communication]]''' ==
 
== '''[[Crisis Management]] and [[Crisis Communication]]''' ==
 
This list of threats is applicable to both crisis management and crisis communication.  It forms the first two set of the 7 sets of the types of crisis or crisis category.  The first two crisis category being "threats" and the next five crisis category is categorised as "[[Crisis Scenario]]."  The rationale is that when it comes to crisis management or crisis communication, the senior management team will regard threats that result in a disaster and crisis scenario that becomes crisis as a similar "bad event".  As a professional, explained simply, [[disaster]] will deny the organisation access to the premises, its people and processes, while, the event of a [[crisis]] occurs, the organisation will still have access to its premises.
 
This list of threats is applicable to both crisis management and crisis communication.  It forms the first two set of the 7 sets of the types of crisis or crisis category.  The first two crisis category being "threats" and the next five crisis category is categorised as "[[Crisis Scenario]]."  The rationale is that when it comes to crisis management or crisis communication, the senior management team will regard threats that result in a disaster and crisis scenario that becomes crisis as a similar "bad event".  As a professional, explained simply, [[disaster]] will deny the organisation access to the premises, its people and processes, while, the event of a [[crisis]] occurs, the organisation will still have access to its premises.
 +
 +
Click to find out more about the {{Types of Crisis Scenarios}}
 
{{Template:BL-CM-5Banner}}
 
{{Template:BL-CM-5Banner}}
 +
 
== '''Denial of Access''' ==
 
== '''Denial of Access''' ==
 
Denial of Access includes all threats that will result in the denial of access/availability to people, processes, infrastructure, and partners/suppliers. This could range from a flood keeping you from entering the office premises to a power outage disrupting work. Below is the full list of possible Denial of Access threats:  
 
Denial of Access includes all threats that will result in the denial of access/availability to people, processes, infrastructure, and partners/suppliers. This could range from a flood keeping you from entering the office premises to a power outage disrupting work. Below is the full list of possible Denial of Access threats:  
Line 60: Line 65:
 
== '''Equipment and IT-related Disruption''' ==
 
== '''Equipment and IT-related Disruption''' ==
 
{{Button Back CM RAR}}  
 
{{Button Back CM RAR}}  
{{Button Back BCM RAR}}  
+
{{Button Back BCM RAR}}
 +
{{Button Back CC RAR}}
 +
{{Button Back ITDR RAR}}
 
*IT Failure (i.e. Hardware, Software)
 
*IT Failure (i.e. Hardware, Software)
 
*Network Failure (i.e. Local and Wide Network)"
 
*Network Failure (i.e. Local and Wide Network)"

Revision as of 05:02, 25 July 2021

ButBackCM RAR.png
BackBCM RAR.png
ButBackCC RAR.png
ButBackITDRP IT RAR.png

List of Threats

This list serves as a set of possible threats that could occur to an organization. It is intended to be used by the various disciplines, starting with business continuity, crisis management, crisis communication and disaster recovery.

Business Continuity Management

Analysing And Reviewing The Risks For Business Continuity Planning BUY!
BCM Planning Methodology RAR.jpg

From this list of threats, the Organization BCM Coordinator together with the BC Team is required to identify and extract the likely and high-impact threats that will affect your organization. Sometimes, this list of threats may be re-organized into Four primary scenarios of internal and external threats: Denial of Access, Unavailability of People, Disruption of Supply Chain, and Equipment and IT-related Disruption.

Click to find out more about the Types of Crisis Scenarios

Crisis Management and Crisis Communication

This list of threats is applicable to both crisis management and crisis communication. It forms the first two set of the 7 sets of the types of crisis or crisis category. The first two crisis category being "threats" and the next five crisis category is categorised as "Crisis Scenario." The rationale is that when it comes to crisis management or crisis communication, the senior management team will regard threats that result in a disaster and crisis scenario that becomes crisis as a similar "bad event". As a professional, explained simply, disaster will deny the organisation access to the premises, its people and processes, while, the event of a crisis occurs, the organisation will still have access to its premises.

Click to find out more about the Types of Crisis Scenarios

Denial of Access

Denial of Access includes all threats that will result in the denial of access/availability to people, processes, infrastructure, and partners/suppliers. This could range from a flood keeping you from entering the office premises to a power outage disrupting work. Below is the full list of possible Denial of Access threats:

Part 1: List of Threats
  • Blizzard
  • Clouds
  • Cyclone
  • Drought
  • Duststorm
  • Flood
  • Flash Flood
  • Fog/ Haze
  • Heat Wave
  • Hurricane
  • Lightning
  • Rain
  • Snow
  • Thunder
  • Tornado
  • Tropical storm
  • Typhoon
  • Weather front
  • Water Spout
  • Wind
  • Wind Storm
  • Fire Storm
  • Fire - Wild, Rural or Urban
  • Terrorism
  • Bomb Threat/Explosion
  • Power Outage
  • Earthquake Tremors

Unavailability of People

  • Labour Dispute/ Strike
  • Infectious Disease/ Pandemic
  • Workplace Safety
  • Workplace Violence
  • Loss of Key Appointment Holders
  • Mishandling of Hazardous Materials
  • Haze

Disruption of Supply Chain

  • Loss of Specialized Vendor/ Partner/ Supplier
  • Regulatory or Legal Violation
  • Default of Key Debtors
  • Accidents (i.e. Aviation, Rail, Maritime, Vehicular)

Equipment and IT-related Disruption

ButBackCM RAR.png
BackBCM RAR.png
ButBackCC RAR.png
ButBackITDRP IT RAR.png
  • IT Failure (i.e. Hardware, Software)
  • Network Failure (i.e. Local and Wide Network)"
  • IT Sabotage
  • Telecommunications Failure (phone line)
  • Facilities and Equipment Failure (i.e. Air-con, Lift, Transformer, HVAC, UPS, Backup Generator)