EBK MANAGEMENT OF INFORMATION SECURITY
6th Edition
ISBN: 9780357752869
Author: WHITMAN
Publisher: CENGAGE CO
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 10, Problem 3E
Program Plan Intro
Disaster recovery:
- Disaster Recovery Plan (DRP) is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
- It allows an organization to maintain or quickly resume mission-critical function following a disaster.
Business continuity:
- Business Continuity Plan (BCP) is a strategy to support the business processes to continue during a time of emergency or disaster.
- It minimizes the downtime and data loss.
- Companies become increasingly reliant on technology to do business.
- Companies place more emphasis on IT and communication services.
Explanation of Solution
Justification:
“Yes” the description that was present on the website was very much identical to the description that is present in the chapter for the terms hot site, warm site and cold site...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
While society expects a business to be prepared for disasters and to recover using its own resources, we do not seem to expect individuals to be prepared to survive a disaster. Should we expect government at any level to be responsible for disaster recovery at either the personal or business level? Why or why not? What sacrifices would a business have to make if the disaster recovery process were turned over to a government agency?
Have a conversation with your other employees about the need of having rules, processes, and a backup plan in order to ensure the smooth running of your organization. Explain a circumstance in which a disaster recovery plan or another policy framework may have averted the problem.
What exactly is a disaster recovery plan, and why is it important for a company to have one? What criteria do you use to evaluate your disaster recovery plan?
Chapter 10 Solutions
EBK MANAGEMENT OF INFORMATION SECURITY
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Discuss your company's need for rules, procedures, and a backup plan with your coworkers. Provide an example of an issue a disaster recovery or policy framework may have prevented.arrow_forwardWhile society expects businesses to be prepared for disasters and to recover using their own resources, it does not appear that individuals are equipped to endure a crisis. Should we expect the government, at any level, to be in charge of catastrophe recovery, whether at the personal or commercial level? If so, why or why not? What kind of concessions would a company have to make if the catastrophe recovery process was handed over to a government agency?arrow_forwardDiscuss with employees the need for rules, processes, and a backup plan to keep your company running. Explain how a disaster recovery plan or other policy framework may have averted the occurrence.arrow_forward
- search the web for an organization (i.e., company, government, university, etc.) that uses a computer incident response plan (CIRP). Discuss the scope, roles and responsibilities, escalation levels, and computer incident response team (CIRT). Feel free to modify these points based on what is available in the CIRP.arrow_forwardWhat is a disaster recovery plan, and why is it important for the organization? How to evaluate the produced disaster recovery plan?arrow_forwardWhat are some strengths and weaknesses of the National Incident Management System (NIMS) when it comes to crisis communication? Can you think of a recent incident or disaster situation where NIMS was not implemented as it was intended? This can be in regards to experience and/or lack of training by emergency managers or any other issue you see that enables one use standard operating procedures (SOPs).arrow_forward
- Talk to your staff about regulations and practices to keep the company functioning properly. For instance, a disaster recovery plan or policy framework might demonstrate how to prevent an issue.arrow_forwardWhat are the advantages and disadvantages of the National Incident Management System (NIMS) in terms of crisis communication? Consider a recent occurrence or disaster scenario in which NIMS was not effectively utilized. This could be due to a lack of knowledge and/or training on the part of emergency managers, or it could be due to any other issue you notice that prohibits someone from following standard operating procedures (SOPs).arrow_forwardWhat are the National Incident Management System's (NIMS) strengths and drawbacks in terms of crisis communication? Consider a recent event or catastrophe scenario in which NIMS was not applied properly. This might be due to a lack of expertise and/or training on the part of emergency managers, or it could be due to any other problem you see that prevents someone from following regular operating protocols (SOPs).arrow_forward
- Talk to your employees about the need of having rules, processes, and a backup plan in place to ensure the smooth running of your business. Provide an example of a case in which the implementation of a disaster recovery plan or other policy framework may have averted the problem.arrow_forwardWhat is the definition of a disaster recovery plan?arrow_forwardWhat makes a good disaster recovery plan?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning