Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 10, Problem 1RQ
Explanation of Solution
Name for the broad process of planning for the unexpected:
- The broad process of planning for the unexpected is called “contingency planning”.
- A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
- It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.
Explanation of Solution
Primary components of contingency planning:
The Primary components of contingency planning are as follows:
- Business impact analysis:
- It calculates the concerns of disturbance of a business function and process and collects information required to improve recovery strategies.
- Incident response planning:
- It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as
computer incident, security incident, and IT incident.
- It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as
- Disaster recovery planning (DRP):
- It is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
- Business continuity planning (BCP):
- It is a strategy to support the business processes can continue during a time of emergency or disaster.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
what is the name for the broad process of planning for the unexpected?
What are its primary components?
make it a 1 page 12pt double spaced plz
With planning, the SDLC comes to a close. Is this a true statement or a false statement?
Are there any differences between disaster recovery plans and business continuity plans?
Chapter 10 Solutions
Management Of Information Security
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- How does the process of planning work, and who is responsible for what?arrow_forwardWhile society expects businesses to be prepared for disasters and to recover using their own resources, it does not appear that individuals are equipped to endure a crisis. Should we expect the government, at any level, to be in charge of catastrophe recovery, whether at the personal or commercial level? If so, why or why not? What kind of concessions would a company have to make if the catastrophe recovery process was handed over to a government agency?arrow_forwardIs there an issue with the information systems of your organization? If that is the case, what are some ways that you can handle the situation?arrow_forward
- Are you able to tell the difference between dangers that are unavoidable and those that can be avoided or mitigated?arrow_forwardA) Examine a scenario when you were faced with an ethical challenge while carrying out a task using technology. B) What was the ethical issue? C) What caused the challenge? D) What decision did you take?arrow_forwardCreate a concrete plan that can be used to transfer past projects that were saved on DVDs to the students’ new laptopsarrow_forward
- Never Cry Wolf: Design solutions Describe how you could have prevented the inmate's escape with a better system design or administrative controls.arrow_forwardWhat are the two different types of Scenario Summary reports, and what are some ways in which they are useful?arrow_forwardThe command pattern and strategy patterns are widely used patterns for encapsulating a behavior or an algorithm. What are the key factors that decide when each pattern can be used. Providing usage examples is encouraged.arrow_forward
- While society expects a business to be prepared for disasters and to recover using its own resources, we do not seem to expect individuals to be prepared to survive a disaster. Should we expect government at any level to be responsible for disaster recovery at either the personal or business level? Why or why not? What sacrifices would a business have to make if the disaster recovery process were turned over to a government agency?arrow_forwardWhat are the benefits of defining scenarios? List down at least four points with brief detail.arrow_forwardWhy is documentation so important for closing a criminal investigation successfully? Determine the bare minimum of paper work that should accompany an inquiry that has nothing to do with computers.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,