Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
bartleby

Concept explainers

Question
Book Icon
Chapter 10, Problem 3E
Program Plan Intro

Disaster recovery:

  • Disaster Recovery Plan (DRP) is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
  • It allows an organization to maintain or quickly resume mission-critical function following a disaster.

Business continuity:

  • Business Continuity Plan (BCP) is a strategy to support the business processes to continue during a time of emergency or disaster.
  • It minimizes the downtime and data loss.
  • Companies become increasingly reliant on technology to do business.
  • Companies place more emphasis on IT and communication services.

Explanation of Solution

Justification:

“Yes” the description that was present on the website was very much identical to the description that is present in the chapter for the terms hot site, warm site and cold site...

Blurred answer
Students have asked these similar questions
While society expects a business to be prepared for disasters and to recover using its own resources, we do not seem to expect individuals to be prepared to survive a disaster. Should we expect government at any level to be responsible for disaster recovery at either the personal or business level? Why or why not? What sacrifices would a business have to make if the disaster recovery process were turned over to a government agency?
What exactly is a disaster recovery plan, and why is it important for a company to have one? What criteria do you use to evaluate your disaster recovery plan?
Have a conversation with your other employees about the need of having rules, processes, and a backup plan in order to ensure the smooth running of your organization. Explain a circumstance in which a disaster recovery plan or another policy framework may have averted the problem.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning