Domain Five: Risk Management Flashcards
(161 cards)
Define the Business Impact document ?
The business impact analysis is often seen as being a document but it is also a set of processes comprising of several different functions and roles within the organisation identifying key business functions or processes that will be impacted during a disruption.
What are the two key metrics used in the BIA ?
Mean Time Between Failure
Mean Time to Repair
What is the first stage in the BIA process or document ?
We need to firstly identify critical functions and then associate the systems that aid those functions. We need to be able to answer the following questions
Do we know what services our customers always expect to be available ?
Do we know what service our employees need available at all times ?
This stage needs SMEs from all the functional areas to help identify this.
What are the five impct areas a BIA document or process should consider ?
Life
Property
Safety
Financial
Reputation
What is a privacy threshold assement ?
A privacy threshold assessment is conducted to determine what levels of information a system is collecting to determine a privacy impact assessment is required.
What is a privacy impact assessment ?
A privacy impact assessment determines the impact on PII contained within that system if it is compromised.
What is the RPO ?
RPO is the maximum allowable time between backups
What is the RTo ?
RTO is the maximum time allowed to restore backups. It designates the amount of real time that can pass before the disruption begins to seriously and unacceptable impede the flow of normal business operations
Describe the four common data sensitivity types ?
Public - Free to all
Proprietary - This is information peculiar to that organisation and can include such things as trade secrets
Confidential Information - Requires restrictive access through such mechanisms as NDA
Private Information - This information sensitivity includes PII and PHI and should be protected extensively
Describe the role of the privacy officer ?
Is responsible for the organisations data privacy. They implement policies and procedures to help carry out privacy controls.
Describe the role of the data steward ?
Manages the day to day control and protection of data for the organisation responsible for compliancy and regulatory understanding
Describe the role of the data owner ?
Responsible for specific data sets but delegates the day to day procedures around data
What are the three reasons for having a data retention policy ?
Version Control - Returning to a last know state
Recovery from Cyber attacks - Especially as attacks are not always discovered immediately
Legal/Regulatory compliance
Name some of the techniques for data sanitisation ?
Burning
Shredding
Pulping
Pulverising
Degaussing
Purging
Wiping
What in digital forensics is the order of volatility ?
Data for investigations should be collected in an order to make sure that most volatile sources prone to destruction as harvested first.
CPU Cache and Registers
Remaining data stored in RAM
Temporary File Systems
Files Written to Disk
Remote monitoring data for the system
Archived Data
What is chain of custody ?
As evidence is collected, we need to ensure that we maintain the integrity of the evidence collected. Everyone that comes into contact with the evidence must be documented and the chain of custody document should show how the evidence was stored.
Name some of the sources we can use for evidence ?
There are several sources of information. We should also capture hashes of the system to be able to prove that it has remained unaltered during the investigation.
Capturing System Images
Network Traffic and Logs
Capturing Video
Screenshots
Witness Interviews
What is legal hold ?
Legal hold refers to special procedures put in place to aid any court proceedings.
What does the term preservation mean ?
Preservation procedures should be put in place to maintain the integrity of the evidence
What are the three areas to consider with recovery ?
Active Logging, Strategic Intelligence, Counterintelligence gathering
What are the different types of backup ?
Full - Backup of whole drive irrespective of whats changed
Incremental/Differential - Backup of whats changed between full backups
Snapshots - VM backups used to spin up new backups
Define continuity of operations ?
Usually attributed to the US Federal Government helps to ensure operations through unanticipated events. The US Government mandates that agencies need to continue to provide services even during times of crisis.
What is continuity planning ?
Usually attributed to the US Federal Government helps to ensure operations through unanticipated events. The US Government mandates that agencies need to continue to provide services even during times of crisis.
What are the five control of disaster recovery controls ?
Deterrant - Those controls that deter but do not prevent, Preventative - Those controls that prevent something from occurring.
Compensatory - Are those mechanisms that are put in place to satisfy requirements for a security measure when management has deemed it to impractical to implement the actual fix.
Corrective - Remediate a risk after being discovered
Detective - Detects events after they have been discovered
Directive controls - Direct on how to achieve security compliancy such as policies