EBK MANAGEMENT OF INFORMATION SECURITY
6th Edition
ISBN: 9780357752869
Author: WHITMAN
Publisher: CENGAGE CO
expand_more
expand_more
format_list_bulleted
Question
Chapter 10, Problem 2RQ
Program Plan Intro
Contingency planning:
- A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
- It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.
Explanation of Solution
Community must give authority to ensure broad support for the plans:
The general “business community” mu...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
In which phase of secSDLC is contingency planning carried out?
Multiple answers :
A: planning
B: analysis
C: design
D: implementation
How is contingency planning implemented?
What exactly is contingency planning?
Chapter 10 Solutions
EBK MANAGEMENT OF INFORMATION SECURITY
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- In which phase of secSDLC is contingency planning carried out?arrow_forwardWhat is contingency planning, and how does it work?arrow_forwardContingency planning consists of four major components: The Business Impact Analysis, the Incident Response Plan, the Disaster Recovery Plan, and the Business Continuity Plan. Is any component better than the other?arrow_forward
- It is recommended to propose a security awareness campaign. Finished works of art should not be missing any important parts. All of the input should be reflected in the final product. Proposal contents will comprise an executive summary, communication plan, proposal introduction, rules and processes, suggested solutions to security flaws, and plans to continuously monitor the organization for hostile behaviour.arrow_forwardDetermining if estimated threats are real threats is the goal of what phase? Static Analysis Dynamic Analysis Casing the Joint Takedownarrow_forward1. Regarding the following, what do you believe plays the more significant role in the decision to implement a countermeasure that protects a mission-critical resource? Defend your choice with valid rationale. - Cost to implement the countermeasure - Operational impact of the countermeasure on normal operationsarrow_forward
- What factors need to be considered in designing a good Disaster Recovery plan?arrow_forwardContingency planning consists of four major components: The Business Impact Analysis, the Incident Response Plan, the Disaster Recovery Plan, and the Business Continuity Plan. How do organizations pick and choose which components are right for their business?arrow_forwardIn which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred? Structured walk-through Desk check Parallel testing Simulationarrow_forward
- Risk reduction strategy(ies) is (are): Select one: a. Damage limitation b. Risk avoidance, Risk detection and removal, and Damage limitation c. Risk detection and removal d. Risk avoidancearrow_forwardWhat is contingency planning?arrow_forwardAfter reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. Discussion Questions Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that? How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance? Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,