Chapter 2: IR, BC and DR Concepts Flashcards

1
Q

Adverse Events

A

Events with a negative consequence, such as system crashes, network packet floods, unauthorised use of system privileges, defacement of a web page or execution of malicious code that destroys data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Breach

A

The loss of control, compromise, unauthorised disclosure, unauthorised acquisition or any similar occurrence where: a person other than an authorised user accesses or potentially accesses personally identifiable information; or an authorised user accesses personally identifiable information for other than an authorised purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BC

A

Business Continuity

Actions, processes and tools for ensuring an organisation can continue critical operations during a contingency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BCP

A

Business Continuity Plan

The documentation of a predetermined set of instructions or procedures that describe how an organisation’s mission/business processes will be sustained during and after a significant disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BIA

A

Business Impact Analysis

An analysis of an information system’s requirements, functions, and interdependencies used to characterise system contingency requirements and priorities in the event of a significant disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DR

A

Disaster Recovery

In information systems terms, the activities necessary to restore IT and communications services to an organisation during and after an outage, disruption or disturbance of any kind or scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DRP

A

A Disaster Recovery Plan (DRP) is a plan for processing and restoring operations in the event of a significant hardware or software failure, or of the destruction of the organisation’s facilities. The primary goal of a DRP is to restore the business to the last-known reliable state of operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit

A

Type of attack that exploits a system’s vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident

A

An event that actually or potentially jeopardises the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IR

A

incident Response

The mitigation of violations of security policies and recommended practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IRP

A

Incident Response Plan

This documentation of a predetermined set of instructions or procedures to detect, respond and limit the consequences of a malicious cyberattack against an organisation’s information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion

A

A security event, or combination of security events, that constitutes a security incident in which an intruder gains , or attempts to gain access to a system or system resource without authorisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOC

A

Security Operation Center

A centralised Organisational function fulfilled by an information security team that monitors, detects and analyses events on the network or system to prevent and resolve issues before they result in business disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hot site

A

A location that is fully equipped to immediately resume operations in the event of a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Warm site

A

Partially equipped with hardware and connectivity solutions but may not have up-to-date data and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cold site

A

Facility with space, power and cooling but lacks equipment and connectivity