SlideShare a Scribd company logo
NATURE OF FORCES
Mrs.G.Chandraprabha.,M.Sc.,M.Phil.,
Assistant Professor
Department of Information Technology,
V.V.Vanniaperumal College for Women,
Virudhunagar.
 Forces of Nature, sometimes called acts of God, can present some
of the most dangerous threats because they usually occur with
little warning and are beyond the control of people.
 It is not possible to avoid threats from forces of nature,
organizations must implement controls to limit damage and
prepare contingency plans for continued operations, such as
 Disaster Recovery Plans
 Business Continuity Plans
 Incident Response Plans
Introduction
Types of threats
 Fire
 Floods
 Earthquakes
 Lightening
 Landslides or Mudslides
 Tornados or Severe Windstorms
 Hurricanes, Typhoons, and Tropical Depressions
 Tsunamis
 Electrostatic Discharge
 Dust Contamination
Fire
• A structural fire can damage a building
with computing equipment that comprises
all or part of an information system.
• This threat can usually be mitigated with
fire casualty insurance or business
interruption insurance.
Floods
• An overflowing of water onto an area that is
normally dry, causing direct damage to all or part
of the information system or to the building that
houses all or part of the information system.
• This threat can sometimes be mitigated with
flood insurance and/or business interruption
insurance.
Earthquakes
• A sudden movement of the earth’s crust caused by the
release of stress accumulated along geologic faults or by
volcanic activity
• Earthquakes can cause direct damage to all or part of the
information system or, more often, to the building that
houses it, and can also disrupt operations through
interruptions in access to the buildings that house all or
part of the information system.
• This threat can sometimes be mitigated with specific
casualty insurance and/or business interruption insurance,
but is usually a separate policy.
Lightening
• An abrupt, discontinuous natural electric
discharge in the atmosphere. Lightning usually
directly damages all or part of the information
system an/or its power distribution components.
• This threat can usually be mitigated with
multipurpose casualty insurance and/or business
interruption insurance.
Landslides or Mudslides
• Land- or mudslides also disrupt operations by interfering
with access to the buildings that house all or part of the
information system.
• This threat can sometimes be mitigated with casualty
insurance and/or business interruption insurance.
• The downward sliding of a mass of earth and rock directly
damaging all or part of the information system or, more
likely, the building that houses it.
Tornados or Severe Windstorms
• A rotating column of air ranging in width from a few yards
to more than a mile and whirling at destructively high
speeds, usually accompanied by a funnel-shaped
downward extension of a cumulonimbus cloud.
• Storms can directly damage all or part of the information
system or, more likely, the building that houses it, and can
also interrupt access to the buildings that house all or part
of the information system.
• This threat can sometimes be mitigated with casualty
insurance and/or business interruption insurance.
Hurricanes, Typhoons, and
Tropical Depressions
• A severe tropical cyclone originating in the equatorial
regions of the Atlantic Ocean or Caribbean Sea or eastern
regions of the Pacific Ocean (typhoon), traveling north,
northwest, or northeast from its point of origin, and usually
involving heavy rains.
• These storms may also disrupt operations by interrupting
access to the buildings that house all or part of the
information system. These storms can directly damage all
or part of the information system or, more likely, the
building that houses it.
Tsunamis
• A very large ocean wave caused by an underwater
earthquake or volcanic eruption. These events can directly
damage all or part of the information system or, more
likely, the building that houses it.
• Tsunamis may also cause disruption to operations through
interruptions in access or electrical power to the buildings
that house all or part of the information system.
• This threat can sometimes be mitigated with casualty
insurance and/or business interruption insurance.
Electrostatic Discharge
• Usually, static electricity and ESD are little more than a
nuisance. Unfortunately, however, the mild static shock we
receive when walking across a carpet can be costly or
dangerous when it ignites flammable mixtures and
damages costly electronic components.
• The cost of ESD-damaged electronic devices and
interruptions to service can range from only a few cents to
several millions of dollars for critical systems.
• While not usually viewed as a threat, ESD can disrupt
information systems, but it is not usually an insurable loss
unless covered by business interruption insurance.
Dust Contamination
• Some environments are not friendly to the hardware
components of information systems. Because dust
contamination can shorten the life of information systems
or cause unplanned downtime, this threat can disrupt
normal operations.
• Some specialized technology, such as CD or DVD optical
drives, can suffer failures due to excessive dust
contamination
THANK YOU !

More Related Content

Similar to IS-Nature of forces.ppt

Its all about noise pollution earthquake and lightining
Its all about noise pollution earthquake and lightiningIts all about noise pollution earthquake and lightining
Its all about noise pollution earthquake and lightiningDeepak Kumar
 
Design and disaster mitigation
Design and disaster mitigationDesign and disaster mitigation
Design and disaster mitigationDenise Tuazon
 
hazardsriskandperils-141016041412-conversion-gate01.pdf
hazardsriskandperils-141016041412-conversion-gate01.pdfhazardsriskandperils-141016041412-conversion-gate01.pdf
hazardsriskandperils-141016041412-conversion-gate01.pdf
ssuser4f7e3f
 
Surge Protection for Fieldbus Systems - ICA 2006
Surge Protection for Fieldbus Systems - ICA 2006Surge Protection for Fieldbus Systems - ICA 2006
Surge Protection for Fieldbus Systems - ICA 2006Alvin CJ Chin
 
Lightning Safety Awareness by Osman Goni
Lightning Safety Awareness by Osman GoniLightning Safety Awareness by Osman Goni
Lightning Safety Awareness by Osman Goni
Osman Goni
 
Professionals - Storms - Prevention
Professionals - Storms - PreventionProfessionals - Storms - Prevention
Professionals - Storms - Prevention
NCC-CCT
 
Lightning Safety Awareness Session by Osman Goni
Lightning Safety Awareness Session by Osman GoniLightning Safety Awareness Session by Osman Goni
Lightning Safety Awareness Session by Osman Goni
Osman Goni
 
Electrical danger
Electrical dangerElectrical danger
Electrical danger
Johan Roels
 
Secondary - Storms - Prevention
Secondary - Storms - PreventionSecondary - Storms - Prevention
Secondary - Storms - Prevention
NCC-CCT
 
ncm 121 DISASTER NURSING prelim powerpoint presentation lecture
ncm 121 DISASTER NURSING prelim powerpoint presentation lecturencm 121 DISASTER NURSING prelim powerpoint presentation lecture
ncm 121 DISASTER NURSING prelim powerpoint presentation lecture
MeegsEstabillo2
 
natural disaster project by mirza ibrahim from greenwich academy
natural disaster project by mirza ibrahim from greenwich academynatural disaster project by mirza ibrahim from greenwich academy
natural disaster project by mirza ibrahim from greenwich academy
199917
 
Lightening
LighteningLightening
Lightening
Md Asif Hasan
 
Hazards Risk and Perils, a complete explanation .
Hazards Risk and Perils,  a complete explanation .Hazards Risk and Perils,  a complete explanation .
Hazards Risk and Perils, a complete explanation .
Sagar Garg
 
Catalogue siemens lightning and overvoltage protection devices
Catalogue siemens lightning and overvoltage protection devicesCatalogue siemens lightning and overvoltage protection devices
Arc –spark = surge in systems=
Arc –spark = surge in systems=Arc –spark = surge in systems=
Arc –spark = surge in systems=
Mahesh Chandra Manav
 
Disasters management
Disasters managementDisasters management
Disasters management
9159781447
 
Disaster management
Disaster managementDisaster management
Disaster management
ShivamMishra424
 
Hydro-Metrological Disasters (Disaster Management)
Hydro-Metrological Disasters (Disaster Management) Hydro-Metrological Disasters (Disaster Management)
Hydro-Metrological Disasters (Disaster Management)
Suraj Biniwale
 

Similar to IS-Nature of forces.ppt (20)

Its all about noise pollution earthquake and lightining
Its all about noise pollution earthquake and lightiningIts all about noise pollution earthquake and lightining
Its all about noise pollution earthquake and lightining
 
Design and disaster mitigation
Design and disaster mitigationDesign and disaster mitigation
Design and disaster mitigation
 
Disaster and Management
Disaster and ManagementDisaster and Management
Disaster and Management
 
hazardsriskandperils-141016041412-conversion-gate01.pdf
hazardsriskandperils-141016041412-conversion-gate01.pdfhazardsriskandperils-141016041412-conversion-gate01.pdf
hazardsriskandperils-141016041412-conversion-gate01.pdf
 
Surge Protection for Fieldbus Systems - ICA 2006
Surge Protection for Fieldbus Systems - ICA 2006Surge Protection for Fieldbus Systems - ICA 2006
Surge Protection for Fieldbus Systems - ICA 2006
 
Lightning Safety Awareness by Osman Goni
Lightning Safety Awareness by Osman GoniLightning Safety Awareness by Osman Goni
Lightning Safety Awareness by Osman Goni
 
Professionals - Storms - Prevention
Professionals - Storms - PreventionProfessionals - Storms - Prevention
Professionals - Storms - Prevention
 
Lightning Safety Awareness Session by Osman Goni
Lightning Safety Awareness Session by Osman GoniLightning Safety Awareness Session by Osman Goni
Lightning Safety Awareness Session by Osman Goni
 
Electrical danger
Electrical dangerElectrical danger
Electrical danger
 
Secondary - Storms - Prevention
Secondary - Storms - PreventionSecondary - Storms - Prevention
Secondary - Storms - Prevention
 
ncm 121 DISASTER NURSING prelim powerpoint presentation lecture
ncm 121 DISASTER NURSING prelim powerpoint presentation lecturencm 121 DISASTER NURSING prelim powerpoint presentation lecture
ncm 121 DISASTER NURSING prelim powerpoint presentation lecture
 
natural disaster project by mirza ibrahim from greenwich academy
natural disaster project by mirza ibrahim from greenwich academynatural disaster project by mirza ibrahim from greenwich academy
natural disaster project by mirza ibrahim from greenwich academy
 
Lightening
LighteningLightening
Lightening
 
Hazards Risk and Perils, a complete explanation .
Hazards Risk and Perils,  a complete explanation .Hazards Risk and Perils,  a complete explanation .
Hazards Risk and Perils, a complete explanation .
 
Catalogue siemens lightning and overvoltage protection devices
Catalogue siemens lightning and overvoltage protection devicesCatalogue siemens lightning and overvoltage protection devices
Catalogue siemens lightning and overvoltage protection devices
 
Arc –spark = surge in systems=
Arc –spark = surge in systems=Arc –spark = surge in systems=
Arc –spark = surge in systems=
 
Disasters management
Disasters managementDisasters management
Disasters management
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Hydro-Metrological Disasters (Disaster Management)
Hydro-Metrological Disasters (Disaster Management) Hydro-Metrological Disasters (Disaster Management)
Hydro-Metrological Disasters (Disaster Management)
 
RAMS Tech Paper
RAMS Tech PaperRAMS Tech Paper
RAMS Tech Paper
 

More from V.V.Vanniaperumal College for Women

Control Memory.pptx
Control Memory.pptxControl Memory.pptx
ADDRESSING MODES.pptx
ADDRESSING MODES.pptxADDRESSING MODES.pptx
Data_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptxData_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptx
V.V.Vanniaperumal College for Women
 
Timing & Control.pptx
Timing & Control.pptxTiming & Control.pptx
Human Rights - 1.pptx
Human Rights - 1.pptxHuman Rights - 1.pptx
Registers.pptx
Registers.pptxRegisters.pptx
Instruction Codes.pptx
Instruction Codes.pptxInstruction Codes.pptx
Instruction Codes.pptx
V.V.Vanniaperumal College for Women
 
Features of Java.pptx
Features of Java.pptxFeatures of Java.pptx
JVM.pptx
JVM.pptxJVM.pptx
Constructors in JAva.pptx
Constructors in JAva.pptxConstructors in JAva.pptx
Constructors in JAva.pptx
V.V.Vanniaperumal College for Women
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Delibrate software attacks.pptx
IS-Delibrate software attacks.pptxIS-Delibrate software attacks.pptx
IS-Delibrate software attacks.pptx
V.V.Vanniaperumal College for Women
 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
V.V.Vanniaperumal College for Women
 
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
V.V.Vanniaperumal College for Women
 
IS-honeypot.pptx
IS-honeypot.pptxIS-honeypot.pptx
Sum of subset problem.pptx
Sum of subset problem.pptxSum of subset problem.pptx
Sum of subset problem.pptx
V.V.Vanniaperumal College for Women
 
M-coloring.pptx
M-coloring.pptxM-coloring.pptx
storm.ppt
storm.pptstorm.ppt
storm for RTA.pptx
storm for RTA.pptxstorm for RTA.pptx
Yarn.ppt
Yarn.pptYarn.ppt

More from V.V.Vanniaperumal College for Women (20)

Control Memory.pptx
Control Memory.pptxControl Memory.pptx
Control Memory.pptx
 
ADDRESSING MODES.pptx
ADDRESSING MODES.pptxADDRESSING MODES.pptx
ADDRESSING MODES.pptx
 
Data_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptxData_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptx
 
Timing & Control.pptx
Timing & Control.pptxTiming & Control.pptx
Timing & Control.pptx
 
Human Rights - 1.pptx
Human Rights - 1.pptxHuman Rights - 1.pptx
Human Rights - 1.pptx
 
Registers.pptx
Registers.pptxRegisters.pptx
Registers.pptx
 
Instruction Codes.pptx
Instruction Codes.pptxInstruction Codes.pptx
Instruction Codes.pptx
 
Features of Java.pptx
Features of Java.pptxFeatures of Java.pptx
Features of Java.pptx
 
JVM.pptx
JVM.pptxJVM.pptx
JVM.pptx
 
Constructors in JAva.pptx
Constructors in JAva.pptxConstructors in JAva.pptx
Constructors in JAva.pptx
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
IS-Delibrate software attacks.pptx
IS-Delibrate software attacks.pptxIS-Delibrate software attacks.pptx
IS-Delibrate software attacks.pptx
 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
 
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
 
IS-honeypot.pptx
IS-honeypot.pptxIS-honeypot.pptx
IS-honeypot.pptx
 
Sum of subset problem.pptx
Sum of subset problem.pptxSum of subset problem.pptx
Sum of subset problem.pptx
 
M-coloring.pptx
M-coloring.pptxM-coloring.pptx
M-coloring.pptx
 
storm.ppt
storm.pptstorm.ppt
storm.ppt
 
storm for RTA.pptx
storm for RTA.pptxstorm for RTA.pptx
storm for RTA.pptx
 
Yarn.ppt
Yarn.pptYarn.ppt
Yarn.ppt
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

IS-Nature of forces.ppt

  • 1. NATURE OF FORCES Mrs.G.Chandraprabha.,M.Sc.,M.Phil., Assistant Professor Department of Information Technology, V.V.Vanniaperumal College for Women, Virudhunagar.
  • 2.  Forces of Nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with little warning and are beyond the control of people.  It is not possible to avoid threats from forces of nature, organizations must implement controls to limit damage and prepare contingency plans for continued operations, such as  Disaster Recovery Plans  Business Continuity Plans  Incident Response Plans Introduction
  • 3. Types of threats  Fire  Floods  Earthquakes  Lightening  Landslides or Mudslides  Tornados or Severe Windstorms  Hurricanes, Typhoons, and Tropical Depressions  Tsunamis  Electrostatic Discharge  Dust Contamination
  • 4. Fire • A structural fire can damage a building with computing equipment that comprises all or part of an information system. • This threat can usually be mitigated with fire casualty insurance or business interruption insurance.
  • 5. Floods • An overflowing of water onto an area that is normally dry, causing direct damage to all or part of the information system or to the building that houses all or part of the information system. • This threat can sometimes be mitigated with flood insurance and/or business interruption insurance.
  • 6. Earthquakes • A sudden movement of the earth’s crust caused by the release of stress accumulated along geologic faults or by volcanic activity • Earthquakes can cause direct damage to all or part of the information system or, more often, to the building that houses it, and can also disrupt operations through interruptions in access to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with specific casualty insurance and/or business interruption insurance, but is usually a separate policy.
  • 7. Lightening • An abrupt, discontinuous natural electric discharge in the atmosphere. Lightning usually directly damages all or part of the information system an/or its power distribution components. • This threat can usually be mitigated with multipurpose casualty insurance and/or business interruption insurance.
  • 8. Landslides or Mudslides • Land- or mudslides also disrupt operations by interfering with access to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with casualty insurance and/or business interruption insurance. • The downward sliding of a mass of earth and rock directly damaging all or part of the information system or, more likely, the building that houses it.
  • 9. Tornados or Severe Windstorms • A rotating column of air ranging in width from a few yards to more than a mile and whirling at destructively high speeds, usually accompanied by a funnel-shaped downward extension of a cumulonimbus cloud. • Storms can directly damage all or part of the information system or, more likely, the building that houses it, and can also interrupt access to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with casualty insurance and/or business interruption insurance.
  • 10. Hurricanes, Typhoons, and Tropical Depressions • A severe tropical cyclone originating in the equatorial regions of the Atlantic Ocean or Caribbean Sea or eastern regions of the Pacific Ocean (typhoon), traveling north, northwest, or northeast from its point of origin, and usually involving heavy rains. • These storms may also disrupt operations by interrupting access to the buildings that house all or part of the information system. These storms can directly damage all or part of the information system or, more likely, the building that houses it.
  • 11. Tsunamis • A very large ocean wave caused by an underwater earthquake or volcanic eruption. These events can directly damage all or part of the information system or, more likely, the building that houses it. • Tsunamis may also cause disruption to operations through interruptions in access or electrical power to the buildings that house all or part of the information system. • This threat can sometimes be mitigated with casualty insurance and/or business interruption insurance.
  • 12. Electrostatic Discharge • Usually, static electricity and ESD are little more than a nuisance. Unfortunately, however, the mild static shock we receive when walking across a carpet can be costly or dangerous when it ignites flammable mixtures and damages costly electronic components. • The cost of ESD-damaged electronic devices and interruptions to service can range from only a few cents to several millions of dollars for critical systems. • While not usually viewed as a threat, ESD can disrupt information systems, but it is not usually an insurable loss unless covered by business interruption insurance.
  • 13. Dust Contamination • Some environments are not friendly to the hardware components of information systems. Because dust contamination can shorten the life of information systems or cause unplanned downtime, this threat can disrupt normal operations. • Some specialized technology, such as CD or DVD optical drives, can suffer failures due to excessive dust contamination

Editor's Notes

  1. www.freepptbackgrounds.net – We are waiting you to visit us.
  2. www.freepptbackgrounds.net – We are waiting you to visit us.