(9) Impact Scope Flashcards
Describe the scope of impact and why it is important in the area of cyber security
Scope of impact is very important because it helps determine the amount and breadth of impact to the company and the effort needed to recover from the incident.
What is functional impact?
Functional impact is the degree of impairment that the organization suffers. This is dependent on how critical the data is to the company, and the processes that the incident hurts.
What are the NIST functional impact categories?
The NIST function impact categories are:
None (no effect on the orgs ability to operate)
Low (Very small effect if any; the org can still operate just fine for the most part)
Medium (The org has critical functionality to a small set of users)
High (The org can’t provide some critical resources/services to any users)
What are the Economic Impact categories?
The economic impact categories are None (no financial impact), Low (Financial loss of 10,000 dollars or less), Medium (Financial impact of 10,000 but less than 500,000) and High (Loss of 500,000 dollars or more)
Describe the Regular and Supplemented recoverability effort categories according to NIST
Regular means that time to recovery is predictable with existing resources
Supplemented is predictable with additional resources
Describe the Extended and Not Recoverable categories according to NIST
The Extended time to recovery is unpredictable, outside help and additional resources are needed
Not Recoverable means that recovery is not possible (ex. sensitive data taken outside network and posted publicly.), launch investigation
Describe the None and Privacy Breach impact categories according to NIST
None means that no information was taken, changed, deleted, or otherwise compromised
Privacy Breach Sensitive PII of taxpayers, employees, beneficiaries, etc. was accessed or taken
Describe the Proprietary Breach and Integrity Loss NIST Information Impact categories
Proprietary breach unclassified proprietary information, such as protected critical infrastructure information PCII was accessed or taken
Integrity Loss Sensitive or proprietary information was changed or deleted