BuyFind

Management Of Information Security

6th Edition
WHITMAN + 1 other
Publisher: Cengage Learning,
ISBN: 9781337405713
BuyFind

Management Of Information Security

6th Edition
WHITMAN + 1 other
Publisher: Cengage Learning,
ISBN: 9781337405713

Solutions

Chapter
Section
Chapter 10, Problem 1RQ
Textbook Problem

What is the name for the broad process of planning for the unexpected? What are its primary components?

Expert Solution

Explanation of Solution

Name for the broad process of planning for the unexpected:

  • The broad process of planning for the unexpected is called “contingency planning”.
  • A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
  • It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.
Expert Solution

Explanation of Solution

Primary components of contingency planning:

The Primary components of contingency planning are as follows:

  • Business impact analysis:
    • It calculates the concerns of disturbance of a business function and process and collects information required to improve recovery strategies.
  • Incident response planning:
    • It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as computer incident, security incident, and IT incident.
  • Disaster recovery planning (DRP):
    • It is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
  • Business continuity planning (BCP):
    • It is a strategy to support the business processes can continue during a time of emergency or disaster.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!

Chapter 10 Solutions

Management Of Information Security

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
For problems 15.33 through 15.40, go through each line of MATLAB code and show the result, or indicate if an er...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

When and how should chips he removed from the work and cutting tool?

Precision Machining Technology (MindTap Course List)

curation website a. text-based name that corresponds to the IP address of a server that hosts a website b. webs...

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)