Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 10, Problem 5E
Program Plan Intro
Incident Response (IR):
Incident response is an organized method used to address and handle the outcome of a security breach or cyber-attack. It is also known as
Incident Response Plan (IRP):
An incident response plan is a set of instructions that supports the IT staff to detect, respond and recover from network security incidents. These types of plans address issues like cybercrime, data loss and service outages.
Program Plan Intro
Contingency Planning:
- A Contingency Planning (CP) is a course of action planned to support an organization to respond efficiently for a significant future situation that may or may not happen.
- It is referred as “plan B” because it can be also used as an alternative for action if estimated outputs fail to occur.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Incident response guidelines specify an incident team's components and how they are used in an organization. What constitutes a good incident response policy?
List and describe the criteria used to determine whether an actual incident is occurring.
How response teams determine the severity of an incident
Chapter 10 Solutions
Management Of Information Security
Ch. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Prob. 15RQCh. 10 - Prob. 16RQCh. 10 - Prob. 17RQCh. 10 - Prob. 18RQCh. 10 - Prob. 19RQCh. 10 - Prob. 20RQCh. 10 - Prob. 1ECh. 10 - Prob. 2ECh. 10 - Prob. 3ECh. 10 - Prob. 4ECh. 10 - Prob. 5ECh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 1EDM
Knowledge Booster
Similar questions
- In the case of a catastrophic incident, the Department of Homeland Security has a number of different alternatives available to it that may make the country feel safer and more secure.arrow_forwardIn cybersecurity, what are some efficient incident handling techniques?arrow_forwardWhat risks are acceptable?arrow_forward
- Comprehensive risk management programme, Identifying, assessing and responding to cyber and information security risks in a structured and methodical manner, as part of wider risk management programme.arrow_forwardWhat should organizations do in the event of a security breach?arrow_forwardIt's critical that you understand what a downgrade assault is and how to guard against it.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,