11-3 Flashcards
the nature of IT is ________, so its important to have a change control process
change
a change control request should have the following
manager signs request it unit verifies the request it unit verifies the change it unit plans to implement change date and time of change scheduled
you must have some sort of plan for how to respond should a security _________ occur.
breach
when a virus hits your system immediately ___________ that system
quarantine
after a successful quarantine has been implemented, you should take the following steps
scan / clean each machine log the incident bring machines online in stages notify appropriate leaders roundtable with IT staff tp discuss breach
use firewall logs or IDS to find out which IP address ____________ the attack
originates
be aware that an intrusion investigation could tune into a __________ investigation
criminal
every incident response team should have some training in digital ____________
forensics
immediately copy the logs of all affected ___________
systems
immediately ________ all systems for trojan horses, firewall setting changes, etc.
scan
document _______________
everything
change all affected user ___________
password
inform appropriate leaders of the incident, followed by an IT
roundtable
with __________ , you want to make sure that your data is accurate, confidential, and available only to those who are authorized
access control
no matter how good your firewalls, proxy server, virus scanning, and policies. if your developers create a code that is flawed, you will have ______________
security breaches.