Bundle: Management Of Information Security, Loose-leaf Version, 6th + Mindtap Information Security, 1 Term (6 Months) Printed Access Card
Bundle: Management Of Information Security, Loose-leaf Version, 6th + Mindtap Information Security, 1 Term (6 Months) Printed Access Card
6th Edition
ISBN: 9781337750790
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 10, Problem 1RQ

Explanation of Solution

Name for the broad process of planning for the unexpected:

  • The broad process of planning for the unexpected is called “contingency planning”.
  • A contingency planning is a course of action planned to support an organization respond efficiently to a significant future situation that may or may not happen.
  • It is referred as “plan B” because it can be used as an alternative for action if estimated outputs fail to occur.

Explanation of Solution

Primary components of contingency planning:

The Primary components of contingency planning are as follows:

  • Business impact analysis:
    • It calculates the concerns of disturbance of a business function and process and collects information required to improve recovery strategies.
  • Incident response planning:
    • It is an organized method to addressing and handling the outcome of a security breach or cyberattack. It is also known as computer incident, security incident, and IT incident.
  • Disaster recovery planning (DRP):
    • It is a set of procedures to recover and protect a business Information Technology (IT) infrastructure in the occurrence of a disaster.
  • Business continuity planning (BCP):
    • It is a strategy to support the business processes can continue during a time of emergency or disaster.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What are the major threats of using the internet? How do you use it? How do children use it? How canwe secure it? Provide four references with your answer. Two of the refernces can be from an article and the other two from websites.
Assume that a string of name & surname is saved in S. The alphabetical characters in S can be in lowercase and/or uppercase letters. Name and surname are assumed to be separated by a space character and the string ends with a full stop "." character. Write an assembly language program that will copy the name to NAME in lowercase and the surname to SNAME in uppercase letters. Assume that name and/or surname cannot exceed 20 characters. The program should be general and work with every possible string with name & surname. However, you can consider the data segment definition given below in your program. .DATA S DB 'Mahmoud Obaid." NAME DB 20 DUP(?) SNAME DB 20 DUP(?) Hint: Uppercase characters are ordered between 'A' (41H) and 'Z' (5AH) and lowercase characters are ordered between 'a' (61H) and 'z' (7AH) in the in the ASCII Code table. For lowercase letters, bit 5 (d5) of the ASCII code is 1 where for uppercase letters it is 0. For example, Letter 'h' Binary ASCII 01101000 68H 'H'…
What did you find most interesting or surprising about the scientist Lavoiser?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning