ias_20250325113745 Flashcards
(76 cards)
- main goal is to restore normal modes of operation with minimal
cost and disruption to normal business activities
after an adverse event
CONTIGENCY PLANNING
- systematic process to determine and
evaluate the potential effects of an
interruption to critical business operations - helps the organization determine which
business functions and information systems
are the most critical to the success of the
organization.
BUSINESS IMPACT ANALYSIS
maximum amount of time that a system
resource can remain unavailable
RECOVERY TIME OBJECTIVE
- point in time before a disruption or system
outage to which business process data can
be recovered
RECOVERY POINT OBJECTIVE
- total amount of time the system owner or
authorizing official is willing to accept for a
business process outage or disruption.
MAXIMUM TOLERABLE DOWNTIME
amount of effort (expressed as elapsed time)
needed to make business functions work
again after the technology element is
recovered.
WORK RECOVERY TIME
- focuses on the immediate response to an
incident.
INCIDENT RESPONSE PLAN
detailed step-by-step methods of preparing,
detecting, reacting to, and recovering from
an incident.
* During the incident - planners develop and
document the procedures that must be
performed during the incident.
* After the incident - must be performed
immediately after the incident has ceased.
* Before the incident — draft a third set of
procedures
IR PROCEDURES
Recognition that an incident is
under way
Detection
Responding to the incident in a
predetermined fashion to contain and
mitigate its potential damage
Reaction
— Returning all systems and data
to their state before the incident
3Recovery
A combination of
on-site and off-site tape-drive, hard-drive,
and cloud backup methods
Traditional Data Backups
—transfers data in bulk
batches to an off-site facility
Electronic Vaulting—
transfers only
transaction data in near real time to an offsite facility.
Remote Journaling
transfers duplicate
online transaction data and duplicate
databases to a remote site on a redundant
server
Database Shadowing
recommends the creation of at least three
copies of critical data (the original and two
copies)
3-2-1 BACKUP RULE
- events represent the potential for loss, they
are referred to as adverse events.
INCIDENT CANDIDATE
adverse event that could result in a loss of
information assets
INCIDENT
- composed of technical IT, managerial IT, and
InfoSec professionals who are prepared to
detect, react to, and recover from an incident;
may include members of the IRPT.
COMPUTER SECURITY INCIDENT RESPONSE
TEAM
— Relates to risk management and
governance
Identify
Relates to implementation of
effective security controls (policy, education,
training and awareness, and technology)
Protect
Relates to the identification of
adverse events
Detect
Relates to reacting to an incident
Respond
Relates to putting things “as they
were before” the incident
Recover