Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 10, Problem 2E

Explanation of Solution

Review of SP 800-34 document:

The special publication “SP 800-34, Contingency Planning Guide for Information Technology Systems, June 2002” includes the directions that are essential for expressing a plan for the different types of disasters, events and different circumstances which are needed in the business continuity.

The NIST method that has been used in the special publication SP 800-34 describes a procedure which contains seven steps are as follows:

  • Development of the statements regarding the business continuity planning policies
    • The formal organizational policy must provide direction and power to the development of an efficient Business Continuity Plan (BCP).
  • Review of the BIA:
    • The help of the Business Improvement Area (BIA) is needed for the identification and prioritization of the important IT systems and different components.
  • Prevention controls have to be identified:
    • Numerous approaches that are carried out for the reduction of the penalties of the system concern will eventually raise the availability of the system and will also result in reducing the life cycle cost...

Blurred answer
Students have asked these similar questions
https://www.usability.gov/sites/default/files/documents/guidelines_book.pdf From the link above, summarise your findings on guidelines from usability.gov .
https://www.usability.gov/sites/default/files/documents/guidelines_book.pdf From the link above give a detail findings on guidelines from usability.gov
What is the process through which SaaS operates? Please elaborate on what you mean.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning