Data Classification PoliciesThe Need for Data ClassificationProtecting InformationRetaining InformationRecovering InformationMilitary Classification SchemesBusiness Classification SchemesDeveloping a Customized Classification SchemeClassifying Your DataData Handling PoliciesThe Need for Policy Governing Data at Rest and in TransitPolicies, Standards, and Procedures Covering the Data Life CycleIdentify Business Risks Related to Information SystemsTypes of RiskDevelopment and Need for Policies Based on Risk ManagementBusiness Impact Analysis (BIA) PoliciesComponent PriorityComponent RelianceImpact ReportDevelopment and Need for Policies Based on BIARisk Assessment PoliciesRisk ExposurePrioritization of Risk, Threat, and VulnerabilitiesRisk Management StrategiesVulnerability AssessmentsVulnerability WindowsPatch ManagementBusiness Continuity Planning (BCP) PoliciesDealing with Loss of Systems, Applications, or Data AvailabilityContinuity of Operations Plan (COOP)Response and Recovery Time Objectives (RTO) Policies Based on the BIADisaster Recovery Plan (DRP) PoliciesDisaster Declaration PolicyAssessment of the Severity of the Disaster and Potential DowntimeDealing with Natural Disasters, Man-Made Disasters, and Catastrophic LossDisaster Recovery Procedures for Mission-Critical System, Application, or Data Functionality and RecoveryRTO Policies Based on Disaster ScenarioBest Practices for Risk Management PoliciesCase Studies and Examples of Risk Management PoliciesPrivate Sector Case ExamplePublic Sector Case ExampleCritical Infrastructure Case StudyCHAPTER SUMMARYKEY CONCEPTS AND TERMSCHAPTER 11 ASSESSMENT