6. System Disruption/Resolution Flashcards

1
Q

What kind of disasters are there?

A
  • Natural: earthquakes, floods, tornados, fire
  • Unintentional human: loss of power, telecommunications, delivery, gas leak
  • Intentional human: terrorist attacks, hackers, viruses, vengeful employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are example of vendors for data back up and recovery?

A
  • DEVSource
  • Rackspace Hosting
  • Kaufman/Rossin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disaster recovery planing: what must be determined beforehand and how is it determined?

A
  • If disruption - recovery point objective - acceptable data loss recovery time objective - acceptable does time.
  • Determined by; criticality of application, cost, time to recover, security
  • Contracting - complex and important
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disaster recovery: what are back up facility types?

A
  • Cold site: no computers ($)
  • Warm site: computer no data ($$)
  • Hot site: everything ($$$)
  • Mirrored site: fully redundant ($$$$)
  • Reciprocal agreement ($?$)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disaster recovery: what is cold site?

A
  • Off-site location with electrical and other physical requirements for processing
  • No equipment or files (added when needed)
  • 1-3 days start-up
  • Cheaper
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disaster recovery: what is warm site?

A
  • Off-site location with similar computer hardware
  • Does not include backed-up data (delivered when needed)
  • More $
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disaster recovery: what is hot site?

A
  • Completely equipped including data
  • Near-immediate (within hours) operation
  • Big $$$ (e.g. medical, credit card systems)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disaster recovery: what is mirrored site?

A
  • Fully redundant, fully staffed, fully equipped
  • Real-time replication of mission critical system,s
  • e.g. credit card processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disaster recovery: what is reciprocal agreement?

A
  • Mutual aid pact
  • Agreement between 2 or more organizations to aid each other with data processing if disaster strikes
  • May be cold, warm, or hot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the purposes of organizational continuity planning (OCP)?

A
  • Identify and plan for disruptions
  • Integrate into business culture
  • Recall risk management lesson/discussion (CGIC) - Interate OCP into risk management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is BRM or ORM?

A

Business risk management / Organizational risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is BCP or OCP?

A

Business continuity planning / Organizational continuity plan
*Process of risk assessment, contingency planning, and long-term continuity maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is BIA?

A

Business impact analysis: Risk analysis portion of BCP.
*Identifies maximum tolerable interruption periods of an organization by function and activity to assess risk importance and consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 6 steps of OCP and BCP?

A
  1. Create a OCP policy and program
  2. Determine critical functions/business risks
  3. Determine continuity strategies
  4. Develop and implement BCM response
  5. Exercise, maintain, and update plan
  6. Embed BCP plan into the culture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is incident management?

A

Map level of incidents to events to responses.

  • E.g. 0=negligible event (e.g. power spike), 7=crisis (pandemic virus and World Trade Center attack)
  • Responses mapped to level of incidents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 3 important functions of an organization?

A
  1. Mission critical: customer facing services, manufacturing, financials
  2. Business critical: ERP systems, payroll, order entry
  3. Task critical: print service, file service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Backup plans: What does an organization want to recover from?

A

From equipment failures, power failures and errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Backup plans: what should be done?

A
  • Maintain at least one remote archive off-site

* Use redundant (multiple) backups (the “Whack-a-Mole” plan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Backup plans: what are 8 control principles?

A
  1. At least one off-site archive
  2. Controls over storage libraries mirror those for data processing sites
  3. Many organizations outsource - choosing a vendor, consider availability, standardization, capacity, speed, and price
  4. Backup procedures may be full (all data), increment (data changed from a certain time) or differential (data changed since the last full backup)
  5. Maintain inventory of backups that identifies data set name, volume serial number, data created, accounting period, and storage location (e.g. bin)
  6. Consider privacy, security and confidentiality of the data (e.g. HIPPA)
  7. Restoration procedures integrated into organization’s continuity plan (OCP)
  8. Backup and restoration procedures regularly tested and reviewed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a backup procedure: archive procedures - old school?

A

“Grandfather, father, son” system:

  • son - newest
  • father - one generation
  • grandfather - two generations
  • Mostly related to batch processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is checkpoint and restart?

A

A backup procedure - Common in batch processing.
Checkpoint;
*Point where processing accuracy is verified
*Periodic backups
*If problem, return to most recent checkpoint and restart

22
Q

What is rollback and recovery?

A

A backup procedure - Common to online, real-time processing

  • Record processing transactions in log
  • Periodically record master file contents
  • If problem, return to good master file and reprocess subsequent transactions
23
Q

What is fault tolerant systems?

A

A network-enabled backup procedure.

  • Operate despite component failure (include redundancy and corrections for component failure)
  • e.g. space flight, commerce, bank credit card processing
24
Q

What is HACs?

A

High-availability clusters = a network-enabled backup procedure.

  • Computer clusters designed to improve service availability.
  • Common in e-commerce
25
Q

What is remote (online) backup by managed provider?

A

An network-enabled backup procedure.

*Automated, outsourced to experts, off-site, can be continuous

26
Q

What is SANs?

A

Storage Area Networks = a network-enabled backup procedure.

  • Replicate data from multiple sites
  • Data immediately available
  • Efficient storage for servers
27
Q

What is mirroring?

A

A network-enabled backup procedure.

  • Maintain exact copy of data set
  • Files are stored in same format as system (e.g. not zipped)
  • Advantage: very fast
  • Disadvantage: storage hog, very expensive
28
Q

Who commits cyber-crime?

A
  • Nation-states and spies: some foreign nations
  • Industrial spies: seek intellectual property and trade secrets for competitive advantage
  • Organized crime: e.g. blackmails
  • Hacktivists: social or political statements - anonymous
  • Hackers and crackers: for fun and challenge
29
Q

What are 4 categories of computer crime?

A
  • Computer or system as target: e.g. denial of service (DoS) attacks and hacking
  • Computer as subject: unlawful access to attack others. e.g. DoS infections
  • Computer as tool: access data or resources. e.g. unauthorized access breaches, phishing, key loggers
  • Computer as symbol/user as target: variation on computer as tool. Deceive user to obtain access. e.g. social engineering
30
Q

What are 4 ways for preventing and detecting computer crimes?

A
  1. Make crime harder: i.e. less likely
  2. Increase the costs (difficulty) of crime
  3. Improve detection methods
  4. Reduce losses
31
Q

List computer attack methods.

A
  • Back door
  • Botnets
  • Denial of Service (DoS)
  • Eavesdropping
  • Email bombing
  • Logic bomb
  • Malware: e.g. viruses, worms, trojan horse
  • Packet sniffing: e.g. Man-in-the Middle
  • Password crackers
  • Session hijacking and masquerading
  • Slami fraud
  • Social engineering/spoofing: e.g. phishing
  • Spam
  • War chalking, driving, walking
32
Q

What is Back door?

A
  • Software allowing unauthorized entry to system by omitting logon procedure
  • Once common among programmers to facilitate development
33
Q

What is Denial of Service attacks?

A
  • Prevent legitimate users accessing systems
  • By flooding server with incomplete access requests
  • Often use botnets (zombi computers)
34
Q

What is Eavesdropping?

A

Unauthorized interception of private communication.

35
Q

What is email bombing or spamming?

A

Sending thousands or millions of emails to an address.

36
Q

What is Logic bomb?

A

Program planted in system dormant until event or time (e.g. date, employee deleted from active status)

37
Q

What is Malware?

A

Malicious Software: exploit system and user vulnerabilities to gain access or damage computer.
E.g. Virus: unauthorized program that copies itself, may damage data.
Worm: virus that replicates across systems; e.g. by sending email floods

38
Q

What can organizations do to prevent and detect unauthorized access?

A

Virus and spyware detection software.

  • To detect and remove malware
  • Essential to networked computing
  • Should always be active and up-to-date
39
Q

What is Trojan horse?

A

Program hidden inside benign file; can insert back door into system.

40
Q

What is packet sniffing?

A

*Identity and authenticity risk
Packet analyzers, network analyzers, and sniffers = have network control (legitimate) and data capture (nefarious) uses.
Packet = formatted block of data carried by a computer network.
Packet sniffing = capture packets of data as they move across a network

41
Q

What is Man-in-the-Middle attack?

A

Example of packet sniffing.

  • Hacker impersonates sender and receiver
  • Relies on attacking mutual authentication
42
Q

What is password crackers?

A
  • Privacy and security risk
  • Software that generates potential passwords and test to gain access
  • Finds weak password easily
43
Q

What is session hijacking and masquerading?

A
  • Identity and authenticity risk
  • Hackers can identify IP address (Internet Protocol - unique identifying number for each device on a networked system) (e.g. via sniffing) and use to access network by masquerading (mimicking) legitimate user
44
Q

What is salami fraud (slicing)?

A

practice of stealing money repeatedly in extremely small quantities

45
Q

What is social engineering?

A

Seek access by tricking employees.

Can be physical or logical.

46
Q

What is phishing?

A

A form of social engineering.

  • Fishing for personal information by “spoofed” emails and fraudulent websites
  • Fool recipients into divulging personal financial data such as CC numbers, account usernames/passwords, SSN etc.
47
Q

What is Spam?

A

Irrelevant or inappropriate email (or text or whatever messaging system comes next) messages sent to either;

  • A large number of recipients
  • The same recipients many times (email bombing)
48
Q

What is war chalking, driving and walking?

A
  • War chalking: draw symbols in public places to indicate available Wi-Fi network access
  • War driving: seeking access to Wi-Fi while driving
  • War walking: seeking access to Wi-Fi while walking, may lead to war chalking
  • War dialing: dialing random phone #s to find network access - old days
49
Q

What should cyber-incident response be based on?

A

Based on organizational protocol.

50
Q

What are 10 steps of cyber incident response process?

A
  1. Planning for and testing protocol
  2. Event detection procedures
  3. Event logging procedures
  4. Triage and incident analysis
  5. Containment and removal of threats
  6. Decision and action regarding event announcement or secrecy
  7. Incident recovery
  8. Closure
  9. Event reporting
  10. Monitoring and system revisions