midterm Flashcards
(81 cards)
- Adverse events
- respective organizational units to prepare for,
detect, react to, and recover - restore normal modes of operation with minimal
cost
CONTIGENCY PLANNING
- crucial foundation for the initial planning
stages - serves as an investigation and assessment
of the impact - systematic process to determine and
evaluate the potential effects of an
interruption to critical business operations - preparatory activity common to both CP and
risk management. - helps the organization determine which
business functions and information systems
are the most critical to the success of the
organization.
BUSINESS IMPACT ANALYSIS
When undertaking the BIA, the organization should
consider the following:
Scope
Plan
Balance
Objective
Follow-up
maximum amount of time that a system
resource can remain unavailable
RECOVER TIME OBJECTIVE
point in time before a disruption or system
outage to which business process data can
be recovered
RECOVERY POINT OBJECTIVE
- total amount of time the system owner or
authorizing official is willing to accept for a
business process outage or disruption.
MAXIMUM TOLERABLE DOWNTIME
amount of effort (expressed as elapsed time)
needed to make business functions work
again after the technology element is
recovered.
WORK RECOVERY TIME
must be carefully planned and coordinated
* describe the overall process, and reaction
* planning and preparation efforts for
detecting, reacting to, and recovering from
an incident.
INCIDENT RESPONSE
describe the entire set of activities or a
specific phase in the overall reaction.
* focuses on the immediate response to an
incident.
* actions taken
INCIDENT RESPONSE PLAN
detailed step-by-step methods of preparing,
detecting, reacting to, and recovering from
an incident.
* During the incident - planners develop and
document the procedures that must be
performed during the incident.
* After the incident - must be performed
immediately after the incident has ceased.
* Before the incident — draft a third set of
procedures
IR PROCEDURES
Recognition that an incident is
under way
Detection
Responding to the incident in a
predetermined fashion to contain and
mitigate its potential damage
Reaction
— Returning all systems and data
to their state before the incident
3Recovery
A combination of
on-site and off-site tape-drive, hard-drive,
and cloud backup methods
Traditional Data Backups
—transfers data in bulk
batches to an off-site facility
Electronic Vaulting—
transfers only
transaction data in near real time to an offsite facility.
Remote Journaling
transfers duplicate
online transaction data and duplicate
databases to a remote site on a redundant
server
Database Shadowing
recommends the creation of at least three
copies of critical data (the original and two
copies)
3-2-1 BACKUP RULE
- events represent the potential for loss, they
are referred to as adverse events.
INCIDENT CANDIDATE
adverse event that could result in a loss of
information assets
INCIDENT
- composed of technical IT, managerial IT, and
InfoSec professionals who are prepared to
detect, react to, and recover from an incident;
may include members of the IRPT.
COMPUTER SECURITY INCIDENT RESPONSE
TEAM
— Relates to risk management and
governance
Identify
Relates to implementation of
effective security controls (policy, education,
training and awareness, and technology)
Protect
Relates to the identification of
adverse events
Detect