Chapter 12 - Security Administration and Planning Flashcards
What are the different stages involved in the lifecycle of a security policy creation?
- Draft Stage
- Approval Stage
- Publication Stage
- Implementation Stage
- Maintenance Stage
What is a Maximum Acceptable Outage (MAO)?
The MAO is the maximum amount of time set by the business upon which service can be down before it starts to have a significant negative impact on the business.
What is the Recovery Time Objective (RTO)?
The RTO should be set to coincide with the MAO time.
What is the Recovery Point Objective (RPO)?
The Recovery Point Objective is the acceptable point upon which data loss is considered acceptable to a business.
For a static database that is backed up weekly, the business may deem that 1 week data loss is within the acceptability threshold.
Other more important databases such as sales would have an RPO at the point of failure where no data loss is acceptable to the business.
What is the difference between BCP and DRP?
BCP has a wider scope than DRP.
DRP is procedural rather BCP may have some degree of being strategic.
What are Table Top testing exercises?
Discussion based exercise where a scenario is presented to a forum consisting of the necessary personnel required should that scenario come to fruition.
The forum talks through the scenario and gives the participants an opportunity to discuss and identify any potential flaws within their controls & methods.
What are Function Exercises?
The BCP/DRP protocols and procedures are exercised to see if this brings the service back up.
In regards to alternative locations, what is a Hot Site?
A Hot Site is a failover mirrored site ready to take on traffic should the primary site fail.
In regards to alternative locations, what is a Cold Site?
A building with basic resources ready to take house resources should an emergency arise and resources must be transferred to this cold site.
In regards to alternative locations, what is a Warm Site?
In between of a hot/cold site.
More resources and personnel are readily available at this site and typically activated in events of predicted emergencies such as hurricanes/storms.
In regards to alternative locations, what is a Mobile Site?
A movable mobile site where critical services and functionality can be hosted and moved to a desired location at short notice.
Who are the NIST institute?
The National Institute of Standards and Technology
Federal funded and their research is publicly published for consumption
What is the Cyber Security Framework?
Written by the NIST institute - the CSF document focuses on using business drivers to focus on cyber security awareness.
What are the three components of the Cyber Security Framework (CSF)?
Framework Core
Implementation Tiers
Framework Profiles
What is the CSF Framework Core?
Outlines cyber security focused activities, references and desired outcomes for an organization.
Activities such as Identify, Protect, Detect, Respond, Recover etc.