Chapter 2 Flashcards

1
Q

Define Breach

A

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Event

A

Any observable occurrence in a network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an incident

A

An event that actually or potentially jeopardizes the CIA of a system or it’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Intrusion

A

A security event, or combination of events, that constitutes a deliberate security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a Theat

A

Any circumstance or event with the potential to adversely impact organizational operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary goal of incident management

A

To be prepared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an adverse event

A

Events with negative consequences. Includes system crashes, malicious code execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does an event become an incident

A

Most events are harmless, but an event that has potential to cause harm or disupt business mission, it is then classified as an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an incident response plan

A

A document that contains predetermined instructions or procedures to detect, respond, and limit consequences of an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 steps to an incident response

A

Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What characterizes the containment step within an incident response

A

Gather evidence.
Choose an appropriate containment strategy.
Identify the attacker.
Isolate the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What characterizes the Detection and Analysis

A

Monitor all possible attack vectors.
Analyze incident using known data and threat intelligence.
Prioritize incident response.
Standardize incident documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What characterizes the preparation step of incident response

A

Develop a policy approved by management.
Identify critical data and systems, single points of failure.
Train staff on incident response.
Implement an incident response team. (covered in subsequent topic)
Practice Incident Identification. (First Response)
Identify Roles and Responsibilities.
Plan the coordination of communication between stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When an incident occurs, what are the responisbilities of the CIRT?

A

Determine the amount and scope of damage caused by the incident.
Determine whether any confidential information was compromised during the incident.
Implement any necessary recovery procedures to restore security and recover from incident-related damage.
Supervise the implementation of any additional security measures necessary to improve security and prevent recurrence of the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

`What is the intent of a BCP

A

Sustian business operations while recovering from a significant distruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristics of BCP

A

Planning, Preparations,response and recovery…Does not typically include items to restore entire business, just focuses on what is critical

17
Q

hWhat are the common components to a BCP

A

List of BCP team members

Immediate response Procedures and checklists
Notification systems and call trees for alerting of BCP activation
Guidance for management, including designation of authority for specific managers
How and when to enact plan
Contact numbers for critical members of the supply chain.

18
Q

what is a redbook?

A

Binder containing hardcopy of BCP procedures and ciritical information regarding restoration

19
Q

How often should a BCP be tested?

A

Routinely. Each individual organization must determine how often to test its BCP, but it should be tested at predefined intervals as well as when significant changes happen within the business environment.

20
Q

Describe a BIA

A

Business impact analysis - Analysis of an IT system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of disuption

21
Q

Good to know

A

A BCP gets the ctitical parts of a business back in action, whereas a DRP guides actions of response until the end goal is reached - Business back up and running

22
Q

What items are included in a DRP

A

The restoration of Information technology and communications services.

23
Q

What are some document types you might find included in a DRP

A

Executive summary providing a high-level overview of the plan
Department-specific plans
Technical guides for IT personnel responsible for implementing and maintaining critical backup systems
Full copies of the plan for critical disaster recovery team members

24
Q

Define Incident handling

A

The mitigation of violations of security policies and recommended practices.