MindTap Information Security, 1 term (6 months) Printed Access Card for Whitman/Mattord's Management of Information Security, 6th (MindTap Course List)
6th Edition
ISBN: 9781337405751
Author: Michael E. Whitman; Herbert J. Mattord
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 10, Problem 1RQ
Explanation of Solution
Name for the broad process of planning for the unexpected:
- The broad process of planning for the unexpected is called “contingency planning”.
- A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
- It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.
Explanation of Solution
Primary components of contingency planning:
The Primary components of contingency planning are as follows:
- Business impact analysis:
- It calculates the concerns of disturbance of a business function and process and collects information required to improve recovery strategies.
- Incident response planning:
- It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as
computer incident, security incident, and IT incident.
- It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as
- Disaster recovery planning (DRP):
- It is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
- Business continuity planning (BCP):
- It is a strategy to support the business processes can continue during a time of emergency or disaster.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What picture do you have in your head when you think about e-mail? When a message is sent, how does it get to the person who is supposed to receive it? Make a note of all of the information you've gathered thus far. What are the differences, and why are they important to understand? Consider the degree of detail (or the level of abstraction) that various types of models possess in comparison to one another.
What pictures come to mind when you hear the term "email"? When an email
is sent, what happens to it? Gather all the information you've gleaned to date
and write it down. I'm wondering if anybody can provide any light on why
these inconsistencies exist. Is there a wide range of complexity in the models
you build?
What kind of mental picture do you conjure up whenever you think about email? Is it possible for a message to be sent to the individual who it is meant for? It is important to keep track of everything you've studied up to this point. To what degree does one's comprehension of the differences between the two need to be prioritised? How specific (or general) are the various models, and how do they stack up against one another?
Chapter 10 Solutions
MindTap Information Security, 1 term (6 months) Printed Access Card for Whitman/Mattord's Management of Information Security, 6th (MindTap Course List)
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- Computer Science Scenario: Suppose you were to let your friend use your computer for a couple of hours in order for them to complete their homework assignments. What kind of precautions would you take before letting them use your computer? In those precautions, what is the logic behind your reasoning? How would your precautions change if this computer was being used by the general public instead?arrow_forwardWhat types of pictures spring to mind for you when you think about email? What exactly happens behind the scenes when an email is sent? Make a list with every piece of information you have discovered so far. Does anybody know what the fundamental causes of these disparities are? Does your model function well at different levels of complexity?arrow_forwardWhen it comes to analyzing people's feelings, what kinds of situations often call for it?arrow_forward
- Identifying those who are stuck provides them with the resources they need. Procedure causes this.arrow_forwardWhen you hear the word "email," what are some of the first things that spring to mind? What happens to an email once it has been sent? Make a note of all the things you have learned that you didn't know previously. I'm curious if anybody has any ideas on what may be causing these discrepancies. Does your organization have a range of model complexity?arrow_forwardWhat pictures come to mind when you think about email? What happens to an email once it is sent? Make a list of everything you've learned thus far. Is anybody aware of the reasons for these disparities, and if so, what they are? Do your models support varying degrees of complexity?arrow_forward
- What are the ways for coming up with new ideas? Explain why criticism is not permitted during group brainstorming sessions.arrow_forwardJust what does it mean to "tweak a plan"?arrow_forwardReview the following list and comment on the four items you think are most crucial to continuous event simulation and why.arrow_forward
- The usage of computers and information systems is now prevalent in many common items such as amusement park rides, automobiles, elevators, and ovens, among other things, that you would not usually connect with computers or information systems. There are certain advantages, but are there any dangers as well? If, for example, you were riding a roller coaster that was computer controlled, would you feel more or less at ease? Alternatively, would you feel secure enough traveling in a Tesla with the auto-drive function turned on? What are the advantages and disadvantages of computerizing a growing number of daily objects? Do the potential benefits outweigh the risks? What is the reason for this or why is it not?arrow_forwardIs there a distinction to be made between the requirement of testing and the testing criteria that must be met?arrow_forwardWhat kind of mental picture do you have of e-mail? When a message is sent, how does it get to its destination? Make a note of what you've learned. What and why are the differences? Consider the degree of detail (or degree of abstraction) contained in various types of modelsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,