Domain 3.2 Flashcards
What type of plan/procedure details how to make a change?
Change Management
true or false: change management is easy to implement
False:
It is easily over looked and is considered very challenging.
Essential to have clear policy surrounding add/change/remove
What is the NIST SP800-61
Provides a handling guide for security incidents
What are the steps included in an incident response lifecycle
-Preparation
-Detection & Analysis
-Containment, Eradication, and recovery
- post incident activity
What are some disasters that could occur
Human created disasters
Natural disasters
technology or system failures
What are some components of a comprehensive recovery plan
- Recovery location
- Data recovery method
- Application restoration
- IT team and employee availability
Describe COOP or BCP
Continuity of operations Planning involves the process of creating alternatives methods of operations that allow the company to continue business in the event of a total system failure.
Give some examples of a COOP
- Manual transactions
- Paper receipts
- phone calls for approval rather than email
what are some concerns when it comes to system lifecycles
Disposal of systems and their information could be unlawful.
You may need to store devices or data for particular amounts of time, or maintain data.
shred sensitive data, never throw it in the trash
What is a SOP
Standard operating procedure
Processes and procedures of a business.
What is an important component to SOPs
They must be documented and written down.
There should be SOPs for the notification of downtime, and facilities issues
Name two common agreements
SLA -
Minimum level of service to be provided
uptime, response time
MOU -
Both sides agree on the contents of the memo.
Usually include statement of confidentiality
What are the two types of NDAs
Unilateral (single parties) or Bilateral (Both parties)
Describe some qualities of a good password policy
High password Entropy ( Very difficult to guess)
- No single words
Mix upper and lower case with special characters
Passwords at least 8 characters
What is an AUP
Acceptable use policy
Detailed document that covers many topics, internet, telephones, PCs
Used by company to limit legal liability