Domain 2: Incident Response, Business Continuity and Disaster Recovery Concepts Flashcards
What is a breach?
The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for other than an authorized purpose. NIST SP 800-53 Rev. 5
What is an event?
Any observable occurrence in a network or system.
What is an exploit?
A particular attack. It is named this way because these attacks exploit system vulnerabilities.
What is an incident?
An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits.
What is an intrusion?
A security event, or combination of events, that constitutes a deliberate security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization.
What is a threat?
Any circumstance or event with the potential to adversely impact organizational operations
What is a vulnerability?
Weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a threat source.
What is zero day?
A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods.
What is an incident response plan?
The incident response process is aimed at reducing the impact of an incident so the organization can resume the interrupted operations as soon as possible.