ABSTRACT

The initial version of this chapter was written for the 1999 edition of the Handbook of Information

Security Management. Since then, Y2K has come and gone, E-commerce has seized the spotlight, and

Web-based technologies are the emerging solution for almost everything. The constant throughout these

occurrences is that no matter what the climate, fundamental business processes have changed little. And,

as always, the focus of any business impact assessment is to assess the time-critical priority of these

business processes. With these more recent realities in mind, this chapter has been updated and is now

offered for your consideration.