PIRDR_1e_FMTOC
PIRDR_1e_FMTOC
net/publication/311573916
CITATIONS READS
30 9,494
2 authors:
All content following this page was uploaded by Michael E. Whitman on 19 July 2019.
PRINCIPLES OF
INCIDENT RESPONSE AND
D I S A S T E R R E C OV E RY
Here you will find the final draft of the Table of Contents for the 1st edition of PIRDR. For
the complete text of the book, please visit www.cengage.com or your favorite online book
dealer.
Regards
Mike Whitman & Herb Mattord, authors
36955_FM 1/3/2006 16:22:48 Page 2
36955_FM 1/3/2006 16:24:24 Page 3
PRINCIPLES OF
INCIDENT RESPONSE AND
D I S A S T E R R E C OV E RY
COPYRIGHT © 2007 Thomson For permission to use material from The Web sites and companies men-
Course Technology, a division of this text or product, contact us by tioned in this book are subject to
Thomson Learning, Inc. Thomson Tel (800) 730-2214 change from time to time as neces-
Fax (800) 730-2215 sary without notice.
Printed in the United States. www.thomsonrights.com
If the names of companies, charac-
For more information, contact Course Disclaimers ters, or places, and the events por-
Technology, 25 Thomson Place, Bos- Course Technology reserves the right trayed, in the opening and closing
ton, Massachusetts, 02210. to revise this publication and make scenarios of each chapter in this book
changes from time to time in its con- bear any similarity to those of actual
Or find us on the World Wide Web at:
tent without notice. Some of the prod- persons (living or dead), companies,
www.course.com
uct names and company names used places, or events, the similarity is
in this book have been used for identi- purely coincidental and accidental.
ALL RIGHTS RESERVED. No part of
this work covered by the copyright fication purposes only and may be
trademarks or registered trademarks ISBN 1-4188-3663-X
hereon may be reproduced or used in
of their respective manufacturers and
any form or by any means—graphic,
electronic, or mechanical, including sellers.
photocopying, recording, taping, Web
distribution, or information storage and
retrieval systems—without the written
permission of the publisher.
36955_FM 1/3/2006 16:30:14 Page 5
To Rhonda, Rachel, Alex and Meghan, thank you for your loving support.
—MEW
For my family.
—HJM
36955_FM 1/3/2006 16:28:53 Page 6
36955_toc 1/9/2006 14:0:10 Page 7
TABLE OF CONTENTS
Preface xiii
Exercises 176
Case Recap 176
Endnotes 177
Table of Contents ix
36955_toc 1/3/2006 16:51:30 Page 10
Table of Contents xi
36955_toc 1/3/2006 16:51:30 Page 12
PREFACE
Approach
The book provides an overview of contingency operations – including its components of, and a
thorough treatment of the administration of the planning process for incident response, disaster
recovery and business continuity planning. It can be used to support course delivery for informa-
tion security driven programs targeted at Information Technology students as well as IT manage-
ment and technology management curricula aimed at business or technical management students.
Chapter Scenarios — Each chapter opens with a short story that follows the same fictional
company as it encounters various contingency planning or operational issues. The scenario also
offers a few discussion questions to round out each scenario. These questions give the student
and the instructor an opportunity to discuss the issues that underlay the content.
Ongoing Case Sidebars — These sections highlight an ongoing case in which a hypothetical
organization deals with the challenges in preparation for and reacting to events that become inci-
dents, disasters and crises. The boxes put the human face to the theoretical context and con-
structs presented, allowing students to experience the challenges and stress of dealing with the
issues associated with contingency operations.
Technical Details Sidebars – These sections highlight specific technical issues, allowing the
student to explore these topics in greater detail.
General Sidebars –
36955_preface 1/9/2006 14:10:5 Page 14
Boxed Examples –
Hands-On Learning — At the end of each chapter, students will find a Chapter Sum-
mary and Review Questions, as well as Exercises, which give them the opportunity to
examine the contingency planning arena outside the classroom. Using the Exercises, the
student can research, analyze and write to reinforce learning objectives and deepen their
understanding of the text.
Author Team
Michael Whitman and Herbert Mattord have jointly developed this text to merge knowledge
from the world of academic study with practical experience from the business world.
Michael Whitman, Ph.D., CISSP is a Professor of Information Systems in the Computer
Science and Information Systems Department at Kennesaw State University, Kennesaw,
Georgia, where he is also the Director of the KSU Center for Information Security Education
(infosec.kennesaw.edu), and the Coordinator of the Bachelor of Science in Information
Security and Assurance. Dr. Whitman teaches graduate and undergraduate courses in
Information Security and Data Communications. He and Herbert Mattord are the authors of
Principles of Information Security, Management of Information Security, Readings and
Cases in the Management of Information Security, and the Hands-On Informaion Security
Lab Manual all from Course Technology. Dr. Whitman is an active researcher in Information
Security, Fair and Responsible Use Policies, Ethical Computing, and Information Systems
Research Methods. He currently teaches graduate and undergraduate courses in Information
Security, Local Area Networking, and Data Communications. He has published articles in the
top journals in his field, including Information Systems Research, the Communications of the
ACM, Information and Management, the Journal of International Business Studies, and the
Journal of Computer Information Systems. He is the chair of the Human Firewall Council and
a member of the Metro Atlanta Information Systems Security Association, the Computer
Security Institute, the Association for Computing Machinery and the Association for Informa-
tion Systems.
Herbert Mattord, M.B.A. CISSP recently completed 24 years of IT industry experience
as an application developer, database administrator, project manager, and information security
practitioner to join the faculty as Kennesaw State University. He and Michael Whitman are the
authors of Principles of Information Security, Management of Information Security, Readings
and Cases in the Management of Information Security, and the Hands-On Information
Security Lab Manual from Course Technology. During his career as an IT practitioner, he
has been an adjunct professor at Kennesaw State University, Southern Polytechnic State
University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State
University: San Marcos. He currently teaches undergraduate courses in Information Security,
Data Communications, Local Area Networks, Database Technology, Project Management, and
Systems Analysis & Design. He was formerly the Manager of Corporate Information Technol-
ogy Security at Georgia-Pacific Corporation, where much of the practical knowledge found in
this and his other textbooks was acquired.
Structure
The textbook is organized into sections based on the functions associated with the various
facets of Contingency Planning: Business Impact Analysis, Incident Response Planning,
Disaster Recovery Planning, Business Continuity Planning and Crisis Management Plan-
ning, and consists of eleven chapters and an Appendix. The text also includes hands-on
laboratory exercises included in the Instructor’s Resource Kit.
UNIT I—INTRODUCTION
U N I T I I — O R G A N I Z AT I O N A L R E A D I N E S S A N D
T H E B U S I N E S S I M PA C T A N A LY S I S
Preface xv
36955_preface 1/3/2006 16:50:30 Page 16
U N I T I V — C O N T I N G E N C Y S T R AT E G I E S
Instructor Resources
A variety of teaching tools have been prepared to support this textbook and offer many
options to enhance the classroom learning experience:
Electronic Instructor’s Manual — The Instructor’s Manual includes suggestions and
strategies for using this text, such as suggestions for lecture topics. The Instructors Manual
also includes answers to the review questions and suggested solutions to the exercises at
the end of each chapter.
Figure Files — Figure Files allow instructors to create their own presentations using
figures taken from the text.
PowerPoint Presentations — This book comes with Microsoft PowerPoint slides for
each chapter. These are included as a teaching aid for classroom presentation, to make
available to students on the network for chapter review, or to be printed for classroom
distribution. Instructors can add their own slides for additional topics they introduce to
the class.
Lab Manual Content — The Instructor’s Resource Kit contains a set of laboratory
exercises specifically designed to assist in student understanding of the challenges in pre-
paring for and reacting to incidents. These exercises are provided for use in hands-on com-
puter labs by the instructor, and include setup and use guides. This information will be
incorporated into future issues of the Hands-On Information Security Lab Manual, also
published by Course Technology.
Curriculum Model for Programs of Study in Information Security and Assurance—
In addition to the texts authored by this team, a curriculum model for programs of study
in Information Security and Assurance is available from the Kennesaw State University
Center for Information Security Education (http://infosec.kennesaw.edu). This document
provides details on designing and implementing security coursework and curricula in aca-
demic institutions, as well as guidance and lessons learned from the authors’ perspective.
ExamView — ExamView®, the ultimate tool for objective-based testing needs. Exam-
View® is a powerful objective-based test generator that enables instructors to create paper,
LAN or Web-based tests from testbanks designed specifically for their Course Technology
text. Instructors can utilize the ultra-efficient QuickTest Wizard to create tests in less than
five minutes by taking advantage of Course Technology’s question banks, or customize
their own exams from scratch.
Preface xvii
36955_preface 1/3/2006 16:50:30 Page 18
ACKNOWLEDGMENTS
The authors would like to thank their families for their support and understanding for the
many hours dedicated to this project, hours taken in many cases from family activities.
Special thanks to Carola Mattord, postgraduate student of English at Georgia State
University. Her reviews of early drafts and suggestions for keeping the writing focused on
the students resulted in a more readable manuscript.
Contributors
Two Kennesaw State University students also assisted in the preparation of the textbook,
and we thank them for their contributions.
-Dan Martin
-Matthew North
Reviewers
We are indebted to the following individuals for their respective contributions of perceptive
feedback on the initial proposal, the project outline, and the chapter-by-chapter reviews of
the text:
TO BE ADDED
Special Thanks
The authors wish to thank the Editorial and Production teams at Course Technology. Their
diligent and professional efforts greatly enhanced the final product:
TO BE ADDED
In addition, several professional and commercial organizations and individuals have
aided the development of the textbook by providing information and inspiration, and the
authors wish to acknowledge their contribution:
-Bernstein Crisis Management
-Continuity Central
-The Human Firewall Council
-Information Systems Security Associations
-The Institute for Crisis Management
-The National Institute of Standards and Technology
-Onecle, Inc.
-Purdue University
-Rothstein Associates, Inc-SunGard
Our colleagues in the Department of Computer Science and Information Systems, Ken-
nesaw State University Professor Merle King, Chair of the Department of Computer Science
and Information Systems, Kennesaw State University
Our Commitment
The authors are committed to serving the needs of the adopters and readers. We would be
pleased and honored to receive feedback on the textbook and its supporting materials. You
can contact us through Course Technology at [email protected].