Title
Statement
Copyright
Dedication
Brief Contents
Table of Contents
Preface
Ch 1: An Overview of Information Security and Risk Management
Upon Completion of This Material, You Should Be Able to:
Introduction
Information Security
Overview of Risk Management
Contingency Planning and Its Components
Role of Information Security Policy in Developing Contingency Plans
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 2: Planning for Organizational Readiness
Upon Completion of This Material, You Should Be Able to:
Introduction
Beginning the Contingency Planning Process
Elements Required to Begin Contingency Planning
Contingency Planning Policy
Business Impact Analysis
BIA Data Collection
Budgeting for Contingency Operations
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 3: Contingency Strategies for IR/DR/BC
Upon Completion of This Material, You Should Be Able to:
Introduction
Data and Application Resumption
Site Resumption Strategies
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 4: Incident Response: Planning
Upon Completion of This Material, You Should Be Able to:
Introduction
The IR Planning Process
Developing the Incident Response Policy
Incident Response Planning
Assembling and Maintaining the Final IR Plan
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 5: Incident Response: Detection and Decision Making
Upon Completion of This Material, You Should Be Able to:
Introduction
Detecting Incidents
Intrusion Detection and Prevention Systems
Incident Decision Making
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 6: Incident Response: Organizing and Preparing the CSIRT
Upon Completion of This Material, You Should Be Able to:
Introduction
Building the CSIRT
Outsourcing Incident Response
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 7: Incident Response: Response Strategies
Upon Completion of This Material, You Should Be Able to:
Introduction
IR Response Strategies
Incident Containment and Eradication Strategies for Specific Attacks
Automated IR Response Systems
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 8: Incident Response: Recovery and Maintenance
Upon Completion of This Material, You Should Be Able to:
Introduction
Recovery
Maintenance
Incident Forensics
eDiscovery and Anti-Forensics
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 9: Disaster Recovery: Preparation and Implementation
Upon Completion of This Material, You Should Be Able to:
Introduction
Disaster Classifications
Forming the Disaster Recovery Team
Disaster Recovery Planning Functions
Information Technology Contingency Planning Considerations
Sample Disaster Recovery Plans
The DR Plan
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 10: Disaster Recovery: Operation and Maintenance
Upon Completion of This Material, You Should Be Able to:
Introduction
Facing Key Challenges
Preparation: Training the DR Team and the Users
Disaster Response Phase
Recovery Phase
Resumption Phase
Restoration Phase
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 11: Business Continuity Planning
Upon Completion of This Material, You Should Be Able to:
Introduction
Business Continuity Team
Business Continuity Policy and Plan Functions
Implementing the BC Plan
Continuous Improvement of the BC Process
Maintaining the BC Plan
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Ch 12: Crisis Management and International Standards in IR/DR/BC
Upon Completion of This Material, You Should Be Able to:
Introduction
Crisis Management in the Organization
Preparing for Crisis Management
Post-crisis Trauma
Getting People Back to Work
Law Enforcement Involvement
Managing Crisis Communications
Succession Planning
International Standards in IR/DR/BC
Chapter Summary
Review Questions
Real-World Exercises
Hands-On Projects
Endnotes
Appendix A: Sample Business Continuity Plan for ABC Co.
Appendix B: Contingency Plan Template from the Computer Security Resource Center at the National Ins
Appendix C: Sample Crisis Management Plan for Hierarchical Access, Ltd.
Glossary
Index
Access no. | Call number | Location | Status |
---|---|---|---|
00841/17 | 658.478 Whi P | Library - 7th Floor | Available |