Week 2 Flashcards

(15 cards)

1
Q

What is Business Continuity Management (BCM)?

A

A holistic management program that:

-Identifies potential threats to an organization.
-Builds resilience and response capabilities.
-Safeguards stakeholders, environment, reputation, and critical operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key goals of BCM?

A

-Identify threats.
-Use risk-based methodologies.
-Develop resiliency in business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three stages of the BCM lifecycle?

A

-Development – Establish a business continuity program.
-Implementation – Deploy strategies and plans.
-Maintenance – Update, test, and refine plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Business Impact Analysis (BIA)?

A

-Assesses the impact of disruptions on operations.
-Establishes recovery objectives (RTO/RPO).
-Determines critical resources needed for recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Recovery Time Objective (RTO) and Recovery Point Objective (RPO).

A

-RTO: Max time to resume operations (e.g., 5 mins for a bank’s payment system).
-RPO: Latest point to recover lost data (e.g., 5 mins for a hospital’s patient records).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Single Point of Failure (SPOF)? How can it be mitigated?

A

-SPOF: A critical resource whose failure cripples operations.
-Mitigation:
Resilience (e.g., load-balancing servers).
Redundancy (e.g., backup systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key components of BCM maintenance?

A

-Training & Awareness – Ensure employees know how to respond.
-Testing & Exercises – Simulate disruptions to evaluate plans.
-Plan Updates – Adapt to new threats or business changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the relationship between BCM and Risk Management?

A

-Risk Management: Preventative (identifies/mitigates risks).
-BCM: Recovery-focused (ensures continuity after an incident).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the NIST definition of security risk?

A

A measure of threat exposure based on:

-Likelihood of occurrence.
Impact if the event happens.
(Reference: NIST SP800-30 R1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the risk formula? Provide an example.

A

Risk = Threat × Vulnerability × Impact

Example:
-High Threat + High Vulnerability = High Risk.
-Low Threat + High Vulnerability = Medium Risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four steps in the Security Risk Management lifecycle?

A

-Identify Risks (assets, threats, vulnerabilities).
-Analyze Risks (assess impact/likelihood).
-Treat Risks (apply controls).
-Monitor Risks (continuous review).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name five key assets to protect in risk management.

A

-Financial assets.
-Physical assets (e.g., hardware).
-Information/data.
-People (employees, customers).
-Intangibles (reputation, trust).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common sources for identifying vulnerabilities?

A

CVE Details (e.g., Log4j vulnerability CVE-2021-44228).
NIST National Vulnerability Database (NVD).
OWASP (web application risks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are five common cyberattack types?

A

-Malware (ransomware, viruses).
-Phishing.
-Denial of Service (DoS).
-SQL Injection.
-Zero-day Exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is a security risk statement structured? Provide an example.

A

-Asset: Customer database.
-Threat: Cyberattack.
-Vulnerability: Weak passwords.
-Impact: Data breach, financial loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly