
the answer is not DRP Jason has just been hired as the Director of IT. He is reviewing existing policies and procedures to determine how well the company has defined the roles of its employees in order to keep the organization secure and operating efficiently under any scenario. He finds that the company does not have an existing plan for how their offices in a hurricane-prone area will continue to operate during a hurricane. Which of the following plans should he consider implementing to ensure that employees at this location and supporting locations will be well prepared to both handle and continue to operate through whatever situations may arise as a result of natural disasters? the answer is not DRP

Trending nowThis is a popular solution!
Step by stepSolved in 3 steps

- Create a remediation plan to map vulnerabilities and risks found to appropriate remediation efforts. Provide a recommendation for the fixes and include an explanation of any resources you may need (i.e., funding, expertise, etc.). Use Appendix Q from the Howard textbook to assist you in your solution .arrow_forwardDiscuss the importance of having policies and procedures as well as a business continuity plan in place with your peers. Provide at least one example of a preventable issue that could occur without a proper policy structure or disaster recovery plan.arrow_forwardWhile society expects businesses to be prepared for disasters and to recover using their own resources, it does not appear that individuals are equipped to endure a crisis. Should we expect the government, at any level, to be in charge of catastrophe recovery, whether at the personal or commercial level? If so, why or why not? What kind of concessions would a company have to make if the catastrophe recovery process was handed over to a government agency?arrow_forward
- What are the National Incident Management System's (NIMS) strengths and drawbacks in terms of crisis communication? Consider a recent event or catastrophe scenario in which NIMS was not applied properly. This might be due to a lack of expertise and/or training on the part of emergency managers, or it could be due to any other problem you see that prevents someone from following regular operating protocols (SOPs).arrow_forwardThe organization you work for in Abu Dhabi is a startup company with 2 years in business. To comply with regulations, your CISO has decided to propose implementation of Information Security Management System (ISMS). As a member of the security team, you have to analyze the business needs for ISMS. Demonstrate effective contributions to the ISMS project team relevant to an assigned task as below: Introduce the Organization Demonstrate your project team Highlight the roles and responsibilities of each team member on the project Develop the ISMS for the organization by utilizing all the steps of from the ISO Standard 27001.arrow_forwardGive a personal example in which a compliance strategy was successfully used. Describe the situation, name the strategy and state the principle on which the strategy is based.arrow_forward
- The institute had no dedicated security team and therefore till now no security policy is in place. Recently, the governing body of this business forms a security team and makes following two goals that they would like to achieve in six months – Assessing the current risk of the entire organization Treat the Risk as much as possible Task I: Risk Identification In achieving the above two goals, you will do the followings – Find at least five assets Find at least two threats against each asset Identify vulnerabilities for the assets Task II: Risk Assessment At the end of the risk identification process, you should have i) a prioritized list of assets and ii) a prioritized list of threats facing those assets and iii) Vulnerabilities of assets. At this point, create Threats- Vulnerabilities-Assets (TVA) worksheet and calculate the risk rating. Task III: Risk Treatment In terms of Risk Treatment, for each of the five identified risks, state what basic strategy you will take.…arrow_forwardWhich of the following is the BEST action to foster a consistent and auditable incident response process? Incent new hires to constantly update the document with external knowledge. Publish the document in a central repository that is easily accessible to the organization. Restrict eligibility to comment on the process to subject matter experts of each IT silo. Rotate CIRT members to foster a shared responsibility model in the organization.arrow_forwardConsider the importance of having a set of guidelines, a set of procedures, and a backup plan for the smooth running of your business with your coworkers. Provide a scenario in which the lack of a disaster recovery or policy framework resulted in an unpleasant outcome.arrow_forward
- Question 15 True or False: Separating the parking lot from the facilities building is a proactive security measure that can minimize threats within the critical space. O True Select the appropriate response False Submit Responsearrow_forwardIn this section, you will prepare a risk mitigation plan using SimpleRisk. Before using SimpleRisk, you will create a paper-based plan. You will need to create three security controls in your risk mitigation plan: one control that reduces the asset value, one that reduces the vulnerability severity, and one that reduces the threat impact. Your security controls should also include examples of both strategic and tactical controls. You can refer to the following table for a clearer picture of the requirements. Security Control Reduces Level (strategic/tactical) Asset value Vulnerability severity Threat Impact Define three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files. Once you have identified your security controls, use SimpleRisk to create a Risk Mitigation plan. You do not need to perform a management review in this section.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





