Table 1. The contingency planning process

From

Recommending Solutions for Contingencies Including Business Impact Analysis, Continuity, and Disaster Recovery

Cheryl Ann Alexander, Lidong Wang

Information Security and Computer Fraud. 2024, 8(1), 1-6 doi:10.12691/iscf-8-1-1