Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Expert Solution & Answer
Book Icon
Chapter 10, Problem 1RQ

Explanation of Solution

Name for the broad process of planning for the unexpected:

  • The broad process of planning for the unexpected is called “contingency planning”.
  • A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
  • It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.

Explanation of Solution

Primary components of contingency planning:

The Primary components of contingency planning are as follows:

  • Business impact analysis:
    • It calculates the concerns of disturbance of a business function and process and collects information required to improve recovery strategies.
  • Incident response planning:
    • It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as computer incident, security incident, and IT incident.
  • Disaster recovery planning (DRP):
    • It is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
  • Business continuity planning (BCP):
    • It is a strategy to support the business processes can continue during a time of emergency or disaster.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What picture do you have in your head when you think about e-mail? When a message is sent, how does it get to the person who is supposed to receive it? Make a note of all of the information you've gathered thus far. What are the differences, and why are they important to understand? Consider the degree of detail (or the level of abstraction) that various types of models possess in comparison to one another.
What pictures come to mind when you hear the term "email"? When an email is sent, what happens to it? Gather all the information you've gleaned to date and write it down. I'm wondering if anybody can provide any light on why these inconsistencies exist. Is there a wide range of complexity in the models you build?
What kind of mental picture do you conjure up whenever you think about email? Is it possible for a message to be sent to the individual who it is meant for? It is important to keep track of everything you've studied up to this point. To what degree does one's comprehension of the differences between the two need to be prioritised? How specific (or general) are the various models, and how do they stack up against one another?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,