Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 10, Problem 2RQ
Program Plan Intro
Contingency planning:
- A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
- It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.
Explanation of Solution
Community must give authority to ensure broad support for the plans:
The general “business community” mu...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
In which phase of secSDLC is contingency planning carried out?
Multiple answers :
A: planning
B: analysis
C: design
D: implementation
How is contingency planning implemented?
In which phase of secSDLC is contingency planning carried out?
Chapter 10 Solutions
Management Of Information Security
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- Contingency planning consists of four major components: The Business Impact Analysis, the Incident Response Plan, the Disaster Recovery Plan, and the Business Continuity Plan. Is any component better than the other?arrow_forwardWhat is contingency planning, and how does it work?arrow_forwardWhat exactly is contingency planning?arrow_forward
- It is recommended to propose a security awareness campaign. Finished works of art should not be missing any important parts. All of the input should be reflected in the final product. Proposal contents will comprise an executive summary, communication plan, proposal introduction, rules and processes, suggested solutions to security flaws, and plans to continuously monitor the organization for hostile behaviour.arrow_forwardDetermining if estimated threats are real threats is the goal of what phase? Static Analysis Dynamic Analysis Casing the Joint Takedownarrow_forwardWhat factors need to be considered in designing a good Disaster Recovery plan?arrow_forward
- 1. Regarding the following, what do you believe plays the more significant role in the decision to implement a countermeasure that protects a mission-critical resource? Defend your choice with valid rationale. - Cost to implement the countermeasure - Operational impact of the countermeasure on normal operationsarrow_forwardContingency planning consists of four major components: The Business Impact Analysis, the Incident Response Plan, the Disaster Recovery Plan, and the Business Continuity Plan. How do organizations pick and choose which components are right for their business?arrow_forwardIn which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred? Structured walk-through Desk check Parallel testing Simulationarrow_forward
- Risk reduction strategy(ies) is (are): Select one: a. Damage limitation b. Risk avoidance, Risk detection and removal, and Damage limitation c. Risk detection and removal d. Risk avoidancearrow_forwardWhat is contingency planning?arrow_forwardJohn just finished his inspection coordinator course. After obtaining his first appointment, he plans to add his personal secretary to the inspection team for the purpose of serving as a session scribe and producing the required reports. He assumes that her participation will free him of the coordination tasks and enable him to conduct the session successfully. Is it advisable to employ a secretary (a non-information technology professional) as a scribe in an inspection session? List the pros and cons of adding such a nonprofessional to the inspection session.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,