The extent that an organization suffers as a result of a threat’s succeeding depends upon
a number of factors, such as the existence of countermeasures and contingency plans. For
example, if a hardware failure occurs corrupting secondary storage, all processing activity
must cease until the problem is resolved. The recovery will depend upon a number of
factors, which include when the last backups were taken and the time needed to restore
the system.