Management of Information Security (MindTap Course List)
5th Edition
ISBN: 9781305501256
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 10, Problem 2RQ
Program Plan Intro
Contingency planning:
- A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
- It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.
Explanation of Solution
Community must give authority to ensure broad support for the plans:
The general “business community” mu...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
How is contingency planning implemented?
What exactly is contingency planning?
What is contingency planning, and how does it work?
Chapter 10 Solutions
Management of Information Security (MindTap Course List)
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- Contingency planning consists of four major components: The Business Impact Analysis, the Incident Response Plan, the Disaster Recovery Plan, and the Business Continuity Plan. Is any component better than the other?arrow_forwardIt is recommended to propose a security awareness campaign. Finished works of art should not be missing any important parts. All of the input should be reflected in the final product. Proposal contents will comprise an executive summary, communication plan, proposal introduction, rules and processes, suggested solutions to security flaws, and plans to continuously monitor the organization for hostile behaviour.arrow_forwardDetermining if estimated threats are real threats is the goal of what phase? Static Analysis Dynamic Analysis Casing the Joint Takedownarrow_forward
- Contingency planning consists of four major components: The Business Impact Analysis, the Incident Response Plan, the Disaster Recovery Plan, and the Business Continuity Plan. How do organizations pick and choose which components are right for their business?arrow_forwardSenior management at Health Network allocated funds to support a risk mitigation plan, and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop this new plan.arrow_forwardIn the context of IT disaster recovery planning, explain the difference between Recovery Time Objective (RTO) and Recovery Point Objective (RPO). How do these metrics impact continuity plans?arrow_forward
- In the threat assessment, what is the difference between capacity and capability?arrow_forwardWithin incident preparation, the first step is to create a policy for incident response and to get the top management's agreement/approval on the policy. An incident response policy describes the standard methods used by the organization for handling information security incidents. Explain two main benefits of having such a policy prepared and approved.arrow_forwardIt is important to understand that the distinction between Response and Recovery is often a fuzzy one, and that the end of one phase and the beginning of another depends on the Incident Commander declaring it to be so. Explain why the Recovery phase can be considered as a "window of opportunity" for Risk Reduction, and describe some kinds of Risk Reduction measures that are easier to achieve during Recovery than at other times (and WHY are they easier?).arrow_forward
- How does the role of a Security Consultant integrate with that of a Systems Architect in ensuring project robustness?arrow_forwardCreate a misuse-case diagram for a specific type of digital/computer-based attack. Be sure to explain the type of attack. Have at least 3 activities that are "allowed" and 2 activities that are considered misuse. Notate what each activity is.arrow_forwardIman Software House is awarded with a contract for developing a flood disaster management system. Although the company has been in the industry for almost three years, this project is considered new and by far the biggest project they ever involved in. A stipulated amount of money has been allocated for the project and there is only three months given before the project is delivered to the client. The short project duration is due to the approaching flood season. The development team therefore must work fast despite of their lack of experience in this type of project. The system requirements are gathered from many different stakeholders including the local authorities, natural disaster management agencies and many more. Among the important measures for this system are Reservoirs, Embankments, Channelisation of Rivers, Drainage Improvement and Diversion of Flood Waters. The system must also be designed to be highly reliable, maintainable and scalable. Based on the above case study, a)…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning