{"id":4,"date":"2023-01-29T15:25:51","date_gmt":"2023-01-29T07:25:51","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/02\/25\/bs25999-bcm-bcp-iso22301\/"},"modified":"2023-01-30T01:27:47","modified_gmt":"2023-01-29T17:27:47","slug":"bs25999-bcm-bcp-iso22301","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=4","title":{"rendered":"ISO 22301 \u71df\u904b\u6301\u7e8c\u7ba1\u7406\u9867\u554f\u670d\u52d9"},"content":{"rendered":"\n<p>\u4ee5\u5f80\u8cc7\u8a0a\u7cfb\u7d71\u7dca\u6025\u61c9\u8b8a\u7ba1\u7406\u8457\u91cd\u65bc\u8cc7\u6599\u5099\u4efd\u53ca\u96fb\u529b\u898f\u5283\u4e0a\uff0c\u5bb9\u6613\u9020\u6210\u65e5\u5f8c\u610f\u5916\u767c\u751f\u6642\uff0c\u76f8\u95dc\u61c9\u8b8a\u63aa\u65bd\u7121\u6cd5\u767c\u63ee\u6548\u7528\uff0c\u64f4\u5927\u4f01\u696d\u640d\u5931\u3002<\/p>\n\n\n\n<p>\u8cfd\u535a\u97d3\u7279\u85c9\u7531\u696d\u52d9\u885d\u64ca\u5206\u6790\uff08Business Impact Analysis\uff09\uff0c\u4ee5\u4f01\u696d\u71df\u904b\u6838\u5fc3\u50f9\u503c\u70ba\u51fa\u767c\u9ede\uff0c\u8003\u91cf\u4f01\u696d\u7d44\u7e54\u6709\u9650\u8cc7\u6e90\uff0c\u9075\u5faa\u71df\u904b\u6301\u7e8c\u7ba1\u7406\uff08ISO 22301:2019 Security and resilience \u2014 Business continuity management systems \u2014 Requirements\uff09 \u570b\u969b\u6a19\u6e96\uff0c\u91cf\u8eab\u8a02\u505a\u5c6c\u65bc\u653f\u5e9c\u8207\u6c11\u9593\u4f01\u696d\u4e4b\u71df\u904b\u6301\u7e8c\u7ba1\u7406\u8a08\u756b (BCM)\uff0c\u505a\u597d\u5371\u6a5f\u8207\u98a8\u96aa\u7ba1\u7406\uff0c\u964d\u4f4e\u4f01\u696d\u9762\u81e8\u98a8\u96aa\u53d7\u5230\u4e4b\u640d\u5931\u3002<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4ee5\u5f80\u8cc7\u8a0a\u7cfb\u7d71\u7dca\u6025\u61c9\u8b8a\u7ba1\u7406\u8457\u91cd\u65bc\u8cc7\u6599\u5099\u4efd\u53ca\u96fb\u529b\u898f\u5283\u4e0a\uff0c\u5bb9\u6613\u9020\u6210\u65e5\u5f8c\u610f\u5916\u767c\u751f\u6642\uff0c\u76f8\u95dc\u61c9\u8b8a\u63aa\u65bd\u7121\u6cd5\u767c\u63ee\u6548\u7528\uff0c\u64f4\u5927\u4f01\u696d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[293],"tags":[287,288],"class_list":["post-4","post","type-post","status-publish","format-standard","hentry","category-cyberhunter-services","tag-bcm","tag-iso22301"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/4\/revisions"}],"predecessor-version":[{"id":1623,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/4\/revisions\/1623"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}