701 - Chapter 11 Flashcards
What process ensures that every proposed change is properly reviewed and cleared by management before it takes place?
Approval process
What clearly defines who is responsible for each change by designating a primary owner who will be the key decision maker and sponsor of the change?
Ownership
What identifies all the individuals and groups within the organization and outside the organization that might be affected by the change?
Stakeholder analysis
What is the review of potential effects of the change, including unintended side effects?
Impact analysis
What confirms that the change will work as expected?
Testing
What provides a detailed sequence of steps that the team should follow if the change goes wrong?
A back out plan
What is the time that is coordinated with stakeholders and that they are aware that the system may be down due to maintenance?
Maintenance window
The change management process should not be closed out until what occurs
All documentation and diagrams are updated to reflect the impact of the change
What is the formal process used to track the current versions of software code and system application configurations?
Version control
What is the data type that is governed by external laws and regulations with which the organizations must comply? And what is an example?
Regulated data… PCI DSS
What data type is about monetary transactions related to an organization or individual?
Financial information
What data type is information that is crucial to the way that an organization runs its business? And what is an example of this?
Intellectual property… trade secrets
And what data type is among the most sense information maintained by an organization?
Legal information
What provides a formal category for identifying the sensitivity and the criticality of #DATA?
Data classification
What are the three levels the US government uses for data classification and what are the four levels that private companies may use?
Top-secret, secret, confidential… public, private, confidential, restricted
What identifies how long data is kept in sometimes specifies where it is stored?
DATA retention policy
What methods ensure that data is removed or destroyed from any devices before disposing of the devices?
DATA sanitation
What is the process of removing all remnants of a file on a desk by overriding the location where the file was stored with ones and zeros?
Files shredding
What refers to the process of completely removing all remnants of data on a disk by overwriting with ones and zeros?
Wiping
True or false solid-state drives can use traditional wiping tools?
False, they require a special process for sanitization because they use flash memory instead of magnetic storage platters…
What is the data sanitation process that uses a very powerful electronic magnet? And can it be used on a hard drive?
Degaussing… no, it will render the drive unusable
At the conclusion of a data destruction process what is the certificate that certifies the process?
Certificate of destruction
What provides a formal coordinated plan that personnel can use when responding to an incident?
Incident response plan
This section of the IRP identifies a difference between an event and an actual incident?
Definition of incident type
This section of the IRP defines the employees required that have expertise in different areas?
Incident response team
This section of the IRP identify specific duties for an incident response team
Rules and responsibilities
What is the part of the IRP that provides direction on how to communicate issues related to an incident?
Communication plan
What defines a security incident and the incident response procedures?
Incident response policy
What are two good Times for the IRP to be reviewed?
Periodically and in response to lessons learned after incidents
What are the seven phases of an incident response process?
Preparation, detection, analysis, containment, eradication, recovery, lessons learned
What is the process to identify what initially went wrong that allowed an incident to occur?
Root cause analysis
What is the scenario base training where participants discuss an analyze a hypothetic incident in a non-threatening environment? And what is a more formal form of hands on hands-on training for an incident?
Table top exercise… simulation
What is the active process for a skilled computer security expert to actively search for cyber threats that might have slipped past regular security systems?
Threat hunting
What is the process and techniques used when collecting information after an incident occurs? And what is the assumption with this process?
Digital forensics… The data collected will be used as evidence in court