Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called into play. a. A hacker breaks into the company network and deletes files from a server. b. A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained. c. A tornado hits a local power station, and the company will be without power for three to five days. d. Employees go on strike, and the company could be without critical workers for weeks. e. A disgruntled employee takes a critical server home, sneaking it out after hours. For each of the scenarios (a–e), describe the steps necessary to restore operations. Indicate whether law enforcement would be involved.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter10: Planning For Contingencies
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question

Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called into play.

a. A hacker breaks into the company network and deletes files from a server.

b. A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained.

c. A tornado hits a local power station, and the company will be without power for three to five days.

d. Employees go on strike, and the company could be without critical workers for weeks.

e. A disgruntled employee takes a critical server home, sneaking it out after hours.

For each of the scenarios (a–e), describe the steps necessary to restore operations. Indicate whether law enforcement would be involved.

 

 

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Risk Management
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,