Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 10, Problem 1RQ
Explanation of Solution
Name for the broad process of planning for the unexpected:
- The broad process of planning for the unexpected is called “contingency planning”.
- A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
- It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.
Explanation of Solution
Primary components of contingency planning:
The Primary components of contingency planning are as follows:
- Business impact analysis:
- It calculates the concerns of disturbance of a business function and process and collects information required to improve recovery strategies.
- Incident response planning:
- It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as
computer incident, security incident, and IT incident.
- It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as
- Disaster recovery planning (DRP):
- It is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
- Business continuity planning (BCP):
- It is a strategy to support the business processes can continue during a time of emergency or disaster.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What part does documentation play in determining whether or not a criminal investigation will be successful? Determine the bare minimum of the documentation that needs to be maintained on hand for an investigation that does not apply to computers.
Analysis and design are comparable: Designs concentrate on the ultimate outcome, whereas analyses include individuals.
What pictures come to mind when you hear the term "email"? When an email is sent, what happens to it? Gather all the information you've gleaned to date and write it down. I'm wondering if anybody can provide any light on why these inconsistencies exist. Is there a wide range of complexity in the models you build?
Chapter 10 Solutions
Management Of Information Security
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- What are the advantages of employing an approach that unfolds gradually?arrow_forwardPlease provide an account of the four most significant things you discovered regarding continuous event simulation.arrow_forwardReview the following list and comment on the four items you think are most crucial to continuous event simulation and why.arrow_forward
- Is the word "interdependence" unique from other system-description terms? If so, how is it distinct from other terms?arrow_forwardLet's talk about the four most important aspects of continuous event simulation and why you think they're so crucial.arrow_forwardWhat kind of mental picture do you have of e-mail? When a message is sent, how does it get to its destination? Make a note of what you've learned. What and why are the differences? Consider the degree of detail (or degree of abstraction) contained in various types of modelsarrow_forward
- What are your four primary justifications for the significance of continuous event simulation?arrow_forwardFor this system: Airline Reservation System For Customers Book Flights Buy Tickets Make Payment Print Boarding card Cancel booking For management staff Create new Flights Modify Flights Details Flights cancel .... Write one scenario and design the corresponding Sequence Diagram that describe one of the main use cases.arrow_forwardIf you're a software developer, imagine that you've been hired to construct a hospital's patient-control app. Modeling of the process is suggested. A rationale for the intended course of action.arrow_forward
- Please present a detailed exposition of the four most significant concepts you acquired regarding continuous event simulation.arrow_forwardWhat sort of mental model of e-mail do you have? What is the process of getting an e-mail message from one place to another? It's a good idea to jot down what you've learnt. What are the differences and why are they made? Consider the amount of detail (or abstraction) that is included in various models of various kinds.arrow_forwardWhat are the phases of a formal review?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,