Chapter 1: Security and Risk Management Flashcards

1
Q

NIST Document for Disaster Recovery

A

800-34

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BCP

A

sustaining operation & more business than IT long term “the sky is fallen” now what do we do… umbrella term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DRP

A

part of the BCP plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Life Safety

A

1 Priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Categories of Disaster

A

Non-disaster, urgent, disaster, catastropheemergency - an immediate event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

warm site

A

office furniture general equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hot site

A

ready to go in 24hrs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cold site

A

empty building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

4 steps of BCP

A

project scope and planning, biz impact assessment, continuity planning, and approval and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MTD

A

max tolerable downtime = WRT x RTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

bridges gap between BIA and BCP

A

strategy development task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

provision and process phase

A

BCP team designs procedures to mitigate risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BCP Coordinator

A

only he can declare disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

wrt

A

CONFIGURE!!!! work recovery time to configure a recovered system (WRT) describes the time required to configure a recovered system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

mtbf

A

mean time between failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BRP

A

provides plans to recover business after a disaster

17
Q

RPO

A

Max amount of data loss a organization can withstand -recovery point objective example: how much time to go without a backup.

18
Q

rto

A

RECOVER SYSTEM!!! max about of time to recover a biz system —-recovery time objective—–

19
Q

WRT

A

work recovery time X RPO

20
Q

Threat

A

Anything that can cause harm to an asset

21
Q

Vulnerability

A

a weakness that allows a threat to cause harm.

22
Q

Risk

A

Threat x Vulnerabilityadded variable called impact which addresses severity in dollars

23
Q

EF

A

Exposure Factor is the percentage of value an asset lost due to an incident.

24
Q

SLE

A

AV x EF

25
Q

ARO

A

annual rate of occurence number of losses you suffer per year

26
Q

ALE

A

annual loss expectancey SLE x ARO

27
Q

OCTAVE

A

Operationally Critical Threat Asset and Vulnerability evaluation . risk management framework from carnegie mellon. three phase process for managing risk

28
Q

ISO 17799 and ISO2700 series

A

17799 was re-numbered to ISO27002 a broad based approach for information security code of practice by the International organization for standardization TEchniquesISO27001 is a related standard describing a process for auditing…Requirements.

29
Q

COBIT/COSO

A

Secure Governance goals for IT orgs. best practices

30
Q

ITIL

A

framework for providing best services in IT service management.

31
Q

accreditation

A

is the data owners acceptance of the risk represented by that system.

32
Q

certification

A

is a detailed inspection that verifies whether a system meets the documented security requirements.

33
Q

BCP Planning Stages

A
  1. Select Individual to interview for data gathering
  2. create data-gathering techniques
  3. id company’s cirital biz fuctions
  4. id the resources these functions depend upon
  5. Calculate how long these functinos can survive without resources.
  6. ID vulnerablilites an threats to these functions
  7. Caluclate Ricks for each different biz funcion
  8. document findings report to management.
34
Q

Software Escrow involves how many parties

A

3 company, client and a trusted 3 rd party for escrow.

35
Q

formula for calulating risks

A

P * M = C

Probability of harm (P) : the chance that a damaging event will occur

Magnitude or Harm (M): the amount of financial damage that would occur should a disaster happen

A tip to use to remember this is: “A Project Manager (PM) cries many times when he thinks of the cost “ (P * M = C)