Beginning the contingency planning process

Assignment Help Basic Computer Science
Reference no: EM132442876

Beginning the Contingency Planning Process.

Fundamentally, the contingency planning process describes comprehensive procedures used by organizations to plan, detect, and respond to various situations. The primary objective of contingency planning is to restore standard operational procedure and eliminate possible distractions (Whitman, Mattord, & Green, 2013). To begin the contingency planning processes, organizations should first identify effective policies and plans and implementing agencies. Correspondingly, the organization should develop response, disaster recovery, business continuity, and crisis management teams. Through the identified contingency planning management teams, the organization will facilitate the execution of related processes. Subsequently, the teams will be responsible for facilitating the accurate identification and prioritization of possible threats and opportunities necessary in sustaining organizational performances (Alexander, 2017). Likewise, the contingency planning team will be responsible for developing effective responses to incidents, designing disaster recovery and crisis management plans, and sustaining the continuity of essential business processes.

Furthermore, elements such as planning methodologies, policy statements, and a detailed BIA are necessary to begin or initiate a contingency planning process. In essence, the team should conduct a comprehensive BIA (Business Impact Analysis) that will enable the organization to integrate essential processes. Other critical elements include increased commitment and involvement from senior organizational executives and management teams (Whitman, Mattord, & Green, 2013). Besides, a planning budget will enable the planning team to access important resources to facilitate the implementation phases.

Markedly, the development of effective contingency planning strategies before beginning the related process will help entities to restore and protect important organizational systems. In general, a contingency planning policy document detailing relevant philosophical and technical perspectives will further necessitate subsequent developments (Whitman, Mattord, & Green, 2013). Specifically, an organization should incorporate a statement of scope or periodic assessment of the business to ascertain the perceived impacts and efficacy of the contingency planning process.

Reference no: EM132442876

Questions Cloud

Explain how the case impacted ediscovery : Use Internet research to find a legal case about eDiscovery (other than Zubulake v. UBS Warburg). Explain how the case impacted eDiscovery.
Evaluate its preparedness for virtualization : Describe the organization's environment, and evaluate its preparedness for virtualization.
Information governance-legal functions : Information Governance-Legal Functions-According to authors, Smallwood, Kahn and Murphy, IG is perhaps one of functional areas that impact legal functions most
Discuss the nonverbal communication : Students are to observe two or more adults unknown to the observer. Discuss the nonverbal communication,
Beginning the contingency planning process : The contingency planning process describes comprehensive procedures used by organizations to plan, detect, and respond to various situations.
What role end-users typically play in incident reporting : Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences?
Develop new information security policy : If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy?
Article pertaining to Blockchain and HR : Find a peer reviewed article pertaining to Blockchain and HR. Discuss the findings and conclusion(s) drawn by the article's author.
Cyber Security-What is Terrorism : Cyber Security-What is Terrorism. Introduction and brief history of Al-Qaeda. Introduction and brief history of Hezbollah

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Variance of the number of chocolate chips in a cookie

Find the mean and the variance of the number of chocolate chips in a cookie. (Round your answers to two decimal places.)mean chocolate chipsvariance chocolate

  Why best training results are observed for moderate values

Explain why the best training results are observed for moderate values of learning rate (neither too small nor too high). Try to confirm your explanation by experimenting with our program. Plot learning rate versus training performance after a set..

  Pros and cons of automation in the workplace

Question 1: Look for a reliable YouTube video or internet article about the pros and cons of automation in the workplace.

  Mutual authentication and establishment of a session key

Design a two-message authentication protocol, assuming that Alice and Bob know each other's public keys, which accomplishes both mutual authentication.

  Why is the long run industry supply curve in a perfectly

Why is the Long Run Industry supply curve in a perfectly competitive market a horizontal line?

  Pseudocode design properly named fields and methods ifs

Pseudocode design Properly named fields and methods Ifs, loops, switchs (basic error checks) Randomize numbers User defined classes (multiple classes) Clean and intuitive displays

  Fit the second-order polynomial regression model

Given the following data, fit the second-order polynomial regression model

  List what is sent and received during the first 8 seconds

Assume a static timeout value of 2 seconds, that slow start is used on a timeout, and that ACKs sent at about the same time are consolidated. Note that R's queue size is now irrelevant (why?).

  Write a client function that returns the back of a queue

The return type is Item Type, and it accepts a Queue object as a parameter.

  How this might affect the ultimate success of the project

On the one hand, such an expansion will mean additional consulting fees for you and your company; on the other hand, you worry about how this might affect the ultimate success of the project. What do you say?

  Different types of switching used in data transmission

Compare or contrast the different types of switching used in data transmission. How many are there? What factors separate one from the other? Please elaborate.

  Replicate given equation using microsoft equation editor

Your assignment is to replicate the following equation using the Microsoft Word Equation Editor. Save and upload the Word document you created.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd