Research security practice and recovery implementation during U.S. disasters between 1970 to the present comparing risk assessment and risk management mistakes. Based on the literature, discuss how a business continuity plan can support secure data, communication flow, and confidentiality during a disaster