Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 10, Problem 18RQ
Program Plan Intro
Unified Continuity Plan:
- Organization can create the three planning element of the Contingency Planning (CP) process such as IRP (Incident Response Plan), DRP (Disaster Recovery Plan) and BCP (Business Continuity Plan) as one unified plan.
- They can also create the three planning element separately in conjunction with a set of interlocking procedures that enables continuity. This is called as unified continuity plan.
Program Plan Intro
Contingency planning:
- A contingency planning is a course of action planned to support an organization that responds efficiently to a significant future which may or may not happen.
- It is referred as “plan B” because it can be also used as an alternative for action, if estimated output fails to occur.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
How is contingency planning implemented?
In which phase of secSDLC is contingency planning carried out?
Multiple answers :
A: planning
B: analysis
C: design
D: implementation
In the context of continuity planning, elaborate on the concept of RTO (Recovery Time Objective) and RPO (Recovery Point Objective). How do these metrics impact the planning process?
Chapter 10 Solutions
Management Of Information Security
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- Even though seven are specified by the OSI reference model, this is not typically the case. There is no point in trying to employ fewer layers if it is not necessary. Is it dangerous to have fewer management levels?arrow_forwardIt is important to have a strategic strategy in the event that information centers want to automate part or all of their activities. Are you in agreement or disagreement? Give your reasoning.arrow_forwardWhat do you mean by "what-if analysis"? Define the term. Is it possible to utilise a spreadsheet for capacity planning purposes?arrow_forward
- What is the most crucial phase in the SDLC, and can you back it up with at least two situations or examples??arrow_forwardWhat are some advanced techniques for ensuring high availability of critical systems and data in a continuity plan, and how do they differ from traditional approaches?arrow_forwardPlanning is the last step in the SDLC. Is it truthful or untrue to say this?arrow_forward
- Contrast the critical success factors (CSFs) and SWOT (i.e., strengths, weaknesses, opportunities, and threats) approaches for assessing opportunities as part of a strategic IS planning process. Under what circumstances might one of these approaches be more useful than the other?arrow_forward5 types of Contingency-Related Plans and describe their purposes and scopesarrow_forwardJohn just finished his inspection coordinator course. After obtaining his first appointment, he plans to add his personal secretary to the inspection team for the purpose of serving as a session scribe and producing the required reports. He assumes that her participation will free him of the coordination tasks and enable him to conduct the session successfully. Is it advisable to employ a secretary (a non-information technology professional) as a scribe in an inspection session? List the pros and cons of adding such a nonprofessional to the inspection session.arrow_forward
- In a post-pandemic world, what lessons have organizations learned about continuity planning, and how have these lessons influenced their strategies?arrow_forwardExplain the strategic management requirement of IS/IT. Explain why the federal model of organizing for IS/IT may not be always suitable. Provide an example of an alternative approach.arrow_forwardAs many critical communication events are planned (eg, client reviews, project reviews, peer reviews), why is there still a need for unplanned communication events (e.g., request for clarification, request for change, issue resolution)?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning