Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 11RQ
Explanation of Solution
Contingency plan:
- A contingency plan is a plan of action used to help the organization efficiently for the significant future situation or event that may or may not occur.
- It is a component of risk management, disaster recovery and business continuity.
- It is also planned for recovering from actions that threaten the information resources in the organization and security of information and to give the successive restoration to regular modes of business operations.
Difference between contingency plan and routine management planning:
Contingency plan | Routine management planning |
Contingency plan includes a set of techniques planned to find and minimize risks, mostly by arranging for the unexpected. | Routine management planning is prepared to keep the business by recognizing the risk. |
These models apply to IT, business, personal and other situations... |
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
How is contingency planning implemented?
What is contingency planning, and how does it work?
In which phase of secSDLC is contingency planning carried out?
Multiple answers :
A: planning
B: analysis
C: design
D: implementation
Chapter 4 Solutions
Principles of Information Security (MindTap Course List)
Ch. 4 - Prob. 1RQCh. 4 - Prob. 2RQCh. 4 - Prob. 3RQCh. 4 - Prob. 4RQCh. 4 - Prob. 5RQCh. 4 - Prob. 6RQCh. 4 - Prob. 7RQCh. 4 - Prob. 8RQCh. 4 - Prob. 9RQCh. 4 - Prob. 10RQ
Ch. 4 - Prob. 11RQCh. 4 - Prob. 12RQCh. 4 - Prob. 13RQCh. 4 - Prob. 14RQCh. 4 - Prob. 15RQCh. 4 - Prob. 16RQCh. 4 - Prob. 17RQCh. 4 - Prob. 18RQCh. 4 - Prob. 19RQCh. 4 - Prob. 20RQCh. 4 - Prob. 2ECh. 4 - Prob. 3ECh. 4 - Prob. 4ECh. 4 - Prob. 5ECh. 4 - Prob. 1CEDQCh. 4 - Prob. 2CEDQCh. 4 - Prob. 3CEDQ
Knowledge Booster
Similar questions
- In what ways can contingency planning and buffers be integrated into the software cost estimation to account for unforeseen challenges?arrow_forwardIn which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred? Structured walk-through Desk check Parallel testing Simulationarrow_forwardHow exactly does one go about transforming an organization's information security plan into a workable project strategy?arrow_forward
- What is project risk management?arrow_forwardHow can risk assessment play a crucial role in developing a continuity plan?arrow_forwardA. Why should continuity plans be tested and rehearsed? B. Identify and briefly discuss three UK laws relevant to the practice of information security. C. Discuss the financial considerations required to implement an information security project. D. What are the main benefits for an organisation that assure from undertaking information security project management?arrow_forward
- How may information be collected in the most effective manner for a comprehensive operations manual?arrow_forwardIt is recommended to propose a security awareness campaign. Finished works of art should not be missing any important parts. All of the input should be reflected in the final product. Proposal contents will comprise an executive summary, communication plan, proposal introduction, rules and processes, suggested solutions to security flaws, and plans to continuously monitor the organization for hostile behaviour.arrow_forwardPlanning is the last step in the SDLC. Is it truthful or untrue to say this?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning