Contingency Planning In Cyber Security