CISSP Security & Risk Management-Business Impact Analysis (BIA)

 

Identifying the Most Critical Functions

If Function “X” Is Not Up and Running………..

Identifying Interdependencies

It is difficult but very important

 

Identifying Functions’ Resources

Critical Items for Certain Functions to Run…..

 

Identifying Vulnerabilities and Threats

Threats Types

 

 

Survival Without Resources?

Maximum Tolerable Downtime (MTD) NIST Guidelines

Each Function/Resource Must Have an MTD Calculated

 

Alternate Sites

Organization-owned & Subscription Services (Exclusive Use Strategies):

Other Options

The major deciding factor for exclusive use strategies is cost.

 

 

 

 

 

 

To Become Certified For CISSP Please Visit This Link;

Exit mobile version