Disaster Recovery Flashcards
Acceptance
Level of tolerance specified by an organization. When all security measures are taken to mitigate a risk, the remainder of impact will be accepted and tolerated as there is not a way to remove it 100 percent.
Avoidance
Removing cause of risk to “avoid” security risks.
Business Continuity Plan (BCP)
Decides which services are sensitive for the regular operations to continue.
Cold Site
Location owned by the organization but contains nothing. In case of disaster the organization will star to equip the cold site to perform the business operations. Could take weeks or months
Disaster Relief Plan (DRP)
Policy that defines how an org will recover from a disaster. The DRP should protect both people and assets of a given organization.
Electronic Vaulting
An alternate location to preserve backed up data. When the backup is complete, it is copied over to a different location. When a disaster occurs the electronic vault is used and the backup is ready to be restored.
Hot Site
Identical site of Primary, equipped with systems and services just like the primary. Data is duplicated here.
Human Threats
Insiders who have access to systems and Hackers
Internal Users
Employees or visitors who could introduce a threat by exploiting a vulnerable or weak point.
Journaling
Less expensive solution to preserve the data as journaling captures only transactions.
Long term
Low Damage recovery, things that affect the daily routine of employees but not productivity, such as having a designated break area.
Mid Term
If part of the business is affected, the business should still be able to meet the needs of its customers.
Mitigation
Using security controls to protect against a risk until the risk impact is reduced to a level that is tolerated by the organization.
Qualitative Analysis
Uses words or ranks to measure the impact of identified risk rather than numbers. Low, medium, and high are usually used to rank the risks.
Quantitative Analysis
Numeric numbers and values and is usually base on statistics, historic records, best practices, testing, and experiments. This method can identify which risk has higher loss impact and which risk requires higher budget to mitigate.