Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 11RQ
Explanation of Solution
Contingency plan:
- A contingency plan is a plan of action used to help the organization efficiently for the significant future situation or event that may or may not occur.
- It is a component of risk management, disaster recovery and business continuity.
- It is also planned for recovering from actions that threaten the information resources in the organization and security of information and to give the successive restoration to regular modes of business operations.
Difference between contingency plan and routine management planning:
Contingency plan | Routine management planning |
Contingency plan includes a set of techniques planned to find and minimize risks, mostly by arranging for the unexpected. | Routine management planning is prepared to keep the business by recognizing the risk. |
These models apply to IT, business, personal and other situations... |
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
What is contingency planning, and how does it work?
What exactly is contingency planning?
In what ways can contingency planning and buffers be integrated into the software cost estimation to account for unforeseen challenges?
Chapter 4 Solutions
Principles of Information Security (MindTap Course List)
Ch. 4 - Prob. 1RQCh. 4 - Prob. 2RQCh. 4 - Prob. 3RQCh. 4 - Prob. 4RQCh. 4 - Prob. 5RQCh. 4 - Prob. 6RQCh. 4 - Prob. 7RQCh. 4 - Prob. 8RQCh. 4 - Prob. 9RQCh. 4 - Prob. 10RQ
Ch. 4 - Prob. 11RQCh. 4 - Prob. 12RQCh. 4 - Prob. 13RQCh. 4 - Prob. 14RQCh. 4 - Prob. 15RQCh. 4 - Prob. 16RQCh. 4 - Prob. 17RQCh. 4 - Prob. 18RQCh. 4 - Prob. 19RQCh. 4 - Prob. 20RQCh. 4 - Prob. 2ECh. 4 - Prob. 3ECh. 4 - Prob. 4ECh. 4 - Prob. 5ECh. 4 - Prob. 1CEDQCh. 4 - Prob. 2CEDQCh. 4 - Prob. 3CEDQ
Knowledge Booster
Similar questions
In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?
Structured walk-through
Desk check
Parallel testing
Simulation
arrow_forward
What are the key considerations when implementing multi-channel conflict resolution strategies, and how can they be managed effectively?
arrow_forward
Discuss the role of risk assessment in the development of a continuity plan. How does it influence the planning process?
arrow_forward
How does the Wilson approach contribute to effective system management? Provide specific examples of its application in real-world scenarios.
arrow_forward
5 types of Contingency-Related Plans and describe their purposes and scopes
arrow_forward
Discuss the role of risk assessment in the development of an effective continuity plan. What are the key steps involved in conducting a comprehensive risk assessment?
arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning