discussion 2610

Are you pressed for time and haven’t started working on your assignment yet? Would you like to buy an assignment? Use our custom writing services for better grades. Even if your deadline is approaching fast, our writers can handle your task right when you need it. Our writers will complete your order from scratch and make sure it’s completely unique.

Order a Similar Paper Order a Different Paper

Contingency plans are measures taken by organizations to prepare and deal with unusual events if they occur. These events are characterized by adverse effects that have the potential to hinder the operations of an organization. Contingency planning creates a blueprint of how the organization will mitigate the effects of a contingency regardless of the size of the organization (Flowerday & Tuyikeze, 2016). Information security policy forms an integral part of developing contingency plans in an organization. It provides a guideline with instructions, special considerations, and recommendations that provide an organization with ways to recover its data and information services in the event of a contingency.

The information security policy provides clear and concise steps to be followed as part of the protective measures to mitigate a contingency. It enhances the protection of data and organization assets in case a disaster or a data security breach occurs (Flowerday & Tuyikeze, 2016). The policy also gives an organization appropriate approaches to undertake when conducting a root cause analysis of a disaster or security breach (Whitman, Mattord, & Green, 2013). In this regard, the information security policy provides considerations on the collection and preservation of evidence.

The information security policy also plays a vital role in identifying the essential information systems, which are the most vulnerable. On the same note, the policy identifies the kind of risks that pose a threat to the organization’s data and information system. To prevent and decrease the impact of contingencies, the policy provides a number of particular measures and assessments that should be implemented to protect the information system (Whitman, Mattord, & Green, 2013). Importantly, the above measures should be compliant with the general organization’s policy. A question that still remains is; what are the compliance considerations during information security policy making?


Flowerday, S. V., & Tuyikeze, T. (2016). Information security policy development and implementation: The what, how and who. Computers & Security, 61, 169-183.

Whitman, M. E., Mattord, H. J., & Green, A. (2013). Principles of incident response and disaster recovery. Cengage Learning


Do you need help with this or a different assignment? Even when your task is complicated and the deadline is in less than 2 days, you still have every chance to get a good grade for it. How? By completing the order form, you will get the finest custom-written assignment at an affordable price. We also deliver a number of services for free (e.g., revisions, editing, checking the text for authenticity). Use our paper writing service to receive effective help with your homework.

Order a Similar Paper Order a Different Paper