1- in order for an Information Security program to be successful within an organization it must relate to the mission. CyberSecurity should not prevent an organization from accomplishing its mission or meeting the needs of their customer. Provide some examples of outside influences that can positively shape a well-designed security program.
2- Read over NIST SP 800-34. What are a business impact analysis, business recovery plan, disaster recovery plan, and business continuity plan? Which do you feel is more important and why? Which is least important and why?