SlideShare a Scribd company logo
NATURE OF FORCES
Mrs.G.Chandraprabha.,M.Sc.,M.Phil.,
Assistant Professor
Department of Information Technology,
V.V.Vanniaperumal College for Women,
Virudhunagar.
 Forces of Nature, sometimes called acts of God, can present some
of the most dangerous threats because they usually occur with
little warning and are beyond the control of people.
 It is not possible to avoid threats from forces of nature,
organizations must implement controls to limit damage and
prepare contingency plans for continued operations, such as
 Disaster Recovery Plans
 Business Continuity Plans
 Incident Response Plans
Introduction
Types of threats
 Fire
 Floods
 Earthquakes
 Lightening
 Landslides or Mudslides
 Tornados or Severe Windstorms
 Hurricanes, Typhoons, and Tropical Depressions
 Tsunamis
 Electrostatic Discharge
 Dust Contamination
Fire
• A structural fire can damage a building
with computing equipment that comprises
all or part of an information system.
• This threat can usually be mitigated with
fire casualty insurance or business
interruption insurance.
Floods
• An overflowing of water onto an area that is
normally dry, causing direct damage to all or part
of the information system or to the building that
houses all or part of the information system.
• This threat can sometimes be mitigated with
flood insurance and/or business interruption
insurance.
Earthquakes
• A sudden movement of the earth’s crust caused by the
release of stress accumulated along geologic faults or by
volcanic activity
• Earthquakes can cause direct damage to all or part of the
information system or, more often, to the building that
houses it, and can also disrupt operations through
interruptions in access to the buildings that house all or
part of the information system.
• This threat can sometimes be mitigated with specific
casualty insurance and/or business interruption insurance,
but is usually a separate policy.
Lightening
• An abrupt, discontinuous natural electric
discharge in the atmosphere. Lightning usually
directly damages all or part of the information
system an/or its power distribution components.
• This threat can usually be mitigated with
multipurpose casualty insurance and/or business
interruption insurance.
Landslides or Mudslides
• Land- or mudslides also disrupt operations by interfering
with access to the buildings that house all or part of the
information system.
• This threat can sometimes be mitigated with casualty
insurance and/or business interruption insurance.
• The downward sliding of a mass of earth and rock directly
damaging all or part of the information system or, more
likely, the building that houses it.
Tornados or Severe Windstorms
• A rotating column of air ranging in width from a few yards
to more than a mile and whirling at destructively high
speeds, usually accompanied by a funnel-shaped
downward extension of a cumulonimbus cloud.
• Storms can directly damage all or part of the information
system or, more likely, the building that houses it, and can
also interrupt access to the buildings that house all or part
of the information system.
• This threat can sometimes be mitigated with casualty
insurance and/or business interruption insurance.
Hurricanes, Typhoons, and
Tropical Depressions
• A severe tropical cyclone originating in the equatorial
regions of the Atlantic Ocean or Caribbean Sea or eastern
regions of the Pacific Ocean (typhoon), traveling north,
northwest, or northeast from its point of origin, and usually
involving heavy rains.
• These storms may also disrupt operations by interrupting
access to the buildings that house all or part of the
information system. These storms can directly damage all
or part of the information system or, more likely, the
building that houses it.
Tsunamis
• A very large ocean wave caused by an underwater
earthquake or volcanic eruption. These events can directly
damage all or part of the information system or, more
likely, the building that houses it.
• Tsunamis may also cause disruption to operations through
interruptions in access or electrical power to the buildings
that house all or part of the information system.
• This threat can sometimes be mitigated with casualty
insurance and/or business interruption insurance.
Electrostatic Discharge
• Usually, static electricity and ESD are little more than a
nuisance. Unfortunately, however, the mild static shock we
receive when walking across a carpet can be costly or
dangerous when it ignites flammable mixtures and
damages costly electronic components.
• The cost of ESD-damaged electronic devices and
interruptions to service can range from only a few cents to
several millions of dollars for critical systems.
• While not usually viewed as a threat, ESD can disrupt
information systems, but it is not usually an insurable loss
unless covered by business interruption insurance.
Dust Contamination
• Some environments are not friendly to the hardware
components of information systems. Because dust
contamination can shorten the life of information systems
or cause unplanned downtime, this threat can disrupt
normal operations.
• Some specialized technology, such as CD or DVD optical
drives, can suffer failures due to excessive dust
contamination
THANK YOU !

More Related Content

PDF
Types of physical situations or occurrencesIt is important to und.pdf
DOCX
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
PDF
How To Identify And Mitigate Security And Intellectual Property Risks When Ou...
PPTX
Threats to information security
PPTX
Disaster impacts
PPTX
Disaster impacts
PPTX
MISO L008 Disaster Recovery Plan
PDF
Risks threats and vulnerabilities
Types of physical situations or occurrencesIt is important to und.pdf
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
How To Identify And Mitigate Security And Intellectual Property Risks When Ou...
Threats to information security
Disaster impacts
Disaster impacts
MISO L008 Disaster Recovery Plan
Risks threats and vulnerabilities

Similar to IS-Nature of forces.ppt (20)

DOCX
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
PPTX
Group 13
PPT
Need for security
PDF
Outsourcing
KEY
Mis
KEY
Chapter 10, part 1
PPT
Security & control in management information system
PPTX
Management Information Systems ( Security and Control.pptx
PDF
Internal Controls Over Information Systems
PPTX
Chapter-2 (1).pptx
PDF
Top 5 Steps to Disaster Preparedness for Businesses
PDF
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
PPTX
MISO L007 managing system security
PDF
Vskills Certified Network Security Professional Sample Material
PPTX
Threats to information security
PPTX
Threats to Information Resources - MIS - Shimna
PPTX
CONTEXTUAL ARCHITECTURE.pptx
DOCX
Risk Assessment In this assignment, you will perform a qualitat.docx
PPT
Information Security Lesson 10 - Operational Security - Eric Vanderburg
PDF
Asking the Right questions
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
Group 13
Need for security
Outsourcing
Mis
Chapter 10, part 1
Security & control in management information system
Management Information Systems ( Security and Control.pptx
Internal Controls Over Information Systems
Chapter-2 (1).pptx
Top 5 Steps to Disaster Preparedness for Businesses
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
MISO L007 managing system security
Vskills Certified Network Security Professional Sample Material
Threats to information security
Threats to Information Resources - MIS - Shimna
CONTEXTUAL ARCHITECTURE.pptx
Risk Assessment In this assignment, you will perform a qualitat.docx
Information Security Lesson 10 - Operational Security - Eric Vanderburg
Asking the Right questions
Ad

More from V.V.Vanniaperumal College for Women (20)

PPTX
inheritance in Java with sample program.pptx
PPTX
System testing in software engineering.pptx
PPTX
static analysis and unit testing in SE.pptx
PPTX
software cost estimation techniques ppt.pptx
PPTX
Software cost factors in software engineering.pptx
PPTX
Planning the development Process in SE.pptx
PPTX
Quality and Productivity Factors in Software Engineering
PPTX
Some Size factors in software engineering
PPTX
PPTX
PPTX
Data_Transfer&Manupulation Instructions.pptx
PPTX
PPTX
PPTX
Instruction Codes.pptx
PPTX
PPTX
Constructors in JAva.pptx
PPTX
PPTX
IS-Delibrate software attacks.pptx
inheritance in Java with sample program.pptx
System testing in software engineering.pptx
static analysis and unit testing in SE.pptx
software cost estimation techniques ppt.pptx
Software cost factors in software engineering.pptx
Planning the development Process in SE.pptx
Quality and Productivity Factors in Software Engineering
Some Size factors in software engineering
Data_Transfer&Manupulation Instructions.pptx
Instruction Codes.pptx
Constructors in JAva.pptx
IS-Delibrate software attacks.pptx
Ad

Recently uploaded (20)

PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Pharma ospi slides which help in ospi learning
PPTX
master seminar digital applications in india
PDF
Complications of Minimal Access Surgery at WLH
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Cell Structure & Organelles in detailed.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
VCE English Exam - Section C Student Revision Booklet
Weekly quiz Compilation Jan -July 25.pdf
Supply Chain Operations Speaking Notes -ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Anesthesia in Laparoscopic Surgery in India
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Pharma ospi slides which help in ospi learning
master seminar digital applications in india
Complications of Minimal Access Surgery at WLH
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Microbial diseases, their pathogenesis and prophylaxis
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Cell Structure & Organelles in detailed.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
VCE English Exam - Section C Student Revision Booklet

IS-Nature of forces.ppt

  • 1. NATURE OF FORCES Mrs.G.Chandraprabha.,M.Sc.,M.Phil., Assistant Professor Department of Information Technology, V.V.Vanniaperumal College for Women, Virudhunagar.
  • 2.  Forces of Nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with little warning and are beyond the control of people.  It is not possible to avoid threats from forces of nature, organizations must implement controls to limit damage and prepare contingency plans for continued operations, such as  Disaster Recovery Plans  Business Continuity Plans  Incident Response Plans Introduction
  • 3. Types of threats  Fire  Floods  Earthquakes  Lightening  Landslides or Mudslides  Tornados or Severe Windstorms  Hurricanes, Typhoons, and Tropical Depressions  Tsunamis  Electrostatic Discharge  Dust Contamination
  • 4. Fire • A structural fire can damage a building with computing equipment that comprises all or part of an information system. • This threat can usually be mitigated with fire casualty insurance or business interruption insurance.
  • 5. Floods • An overflowing of water onto an area that is normally dry, causing direct damage to all or part of the information system or to the building that houses all or part of the information system. • This threat can sometimes be mitigated with flood insurance and/or business interruption insurance.
  • 6. Earthquakes • A sudden movement of the earth’s crust caused by the release of stress accumulated along geologic faults or by volcanic activity • Earthquakes can cause direct damage to all or part of the information system or, more often, to the building that houses it, and can also disrupt operations through interruptions in access to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with specific casualty insurance and/or business interruption insurance, but is usually a separate policy.
  • 7. Lightening • An abrupt, discontinuous natural electric discharge in the atmosphere. Lightning usually directly damages all or part of the information system an/or its power distribution components. • This threat can usually be mitigated with multipurpose casualty insurance and/or business interruption insurance.
  • 8. Landslides or Mudslides • Land- or mudslides also disrupt operations by interfering with access to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with casualty insurance and/or business interruption insurance. • The downward sliding of a mass of earth and rock directly damaging all or part of the information system or, more likely, the building that houses it.
  • 9. Tornados or Severe Windstorms • A rotating column of air ranging in width from a few yards to more than a mile and whirling at destructively high speeds, usually accompanied by a funnel-shaped downward extension of a cumulonimbus cloud. • Storms can directly damage all or part of the information system or, more likely, the building that houses it, and can also interrupt access to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with casualty insurance and/or business interruption insurance.
  • 10. Hurricanes, Typhoons, and Tropical Depressions • A severe tropical cyclone originating in the equatorial regions of the Atlantic Ocean or Caribbean Sea or eastern regions of the Pacific Ocean (typhoon), traveling north, northwest, or northeast from its point of origin, and usually involving heavy rains. • These storms may also disrupt operations by interrupting access to the buildings that house all or part of the information system. These storms can directly damage all or part of the information system or, more likely, the building that houses it.
  • 11. Tsunamis • A very large ocean wave caused by an underwater earthquake or volcanic eruption. These events can directly damage all or part of the information system or, more likely, the building that houses it. • Tsunamis may also cause disruption to operations through interruptions in access or electrical power to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with casualty insurance and/or business interruption insurance.
  • 12. Electrostatic Discharge • Usually, static electricity and ESD are little more than a nuisance. Unfortunately, however, the mild static shock we receive when walking across a carpet can be costly or dangerous when it ignites flammable mixtures and damages costly electronic components. • The cost of ESD-damaged electronic devices and interruptions to service can range from only a few cents to several millions of dollars for critical systems. • While not usually viewed as a threat, ESD can disrupt information systems, but it is not usually an insurable loss unless covered by business interruption insurance.
  • 13. Dust Contamination • Some environments are not friendly to the hardware components of information systems. Because dust contamination can shorten the life of information systems or cause unplanned downtime, this threat can disrupt normal operations. • Some specialized technology, such as CD or DVD optical drives, can suffer failures due to excessive dust contamination

Editor's Notes

  • #2: www.freepptbackgrounds.net – We are waiting you to visit us.
  • #15: www.freepptbackgrounds.net – We are waiting you to visit us.