Lecture 6 Flashcards
?
Everyone in an organization needs to be trained and aware of information security; not every member needs formal degree or certificate in information security
Identify
1/3 ?
Security Education
?
When formal education for individuals in security is needed, an employee can identify curriculum available from local institutions of higher learning or continuing education
Identify
2/3 ?
Security Education
?
A number of universities have formal coursework in information security
Identify
3/3 ?
Security Education
?
Involves providing members of organization with detailed information and hands-on instruction designed to prepare them to perform their duties securely
Identify
1/2 ?
Security Training
?
Management of information security can develop customized in-house training or outsource the training program
Identify
2/2 ?
Security Training
?
One of least frequently implemented but most beneficial programs is the ? program
Identify
1/4 ?
Security Awareness
?
Designed to keep information security at the forefront of users’ minds
Identify
2/4 ?
Security Awareness
?
Need not be complicated or expensive
Identify
3/4 ?
Security Awareness
?
If the program is not actively implemented, employees begin to “tune out” and risk of employee accidents and failures increases
Identify
4/4 ?
Security Awareness
?
Continuous availability of info systems
Identify
1/3 ?
Continuity Strategies
?
Probability high for attack
Identify
2/3 ?
Continuity Strategies
?
Managers must be ready to act
Identify
3/3 ?
Continuity Strategies
?
Prepared by organization
Identify
Continuity Strategies - 1/3 ?
Contingency Plan (CP)
?
Anticipate, react to, & recover from attacks
Identify
Continuity Strategies - 2/3 ?
Contingency Plan (CP)
?
Restore organization to normal operations
Identify
Continuity Strategies - 3/3 ?
Contingency Plan (CP)
3 Components of Contingency Plan
Enumerate
Continuity Strategies - 3 Components of Contingency Plan
- Incident Response (IRPs)
- Disaster Recovery (DRPs)
- Business Continuity (BCPs)
?
Focus on immediate response
Identify
Continuity Strategies - 1/3 Components of Contingency Plan
Incident Response (IRPs)
?
Focus on restoring system
Identify
Continuity Strategies - 2/3 Components of Contingency Plan
Disaster Recovery (DRPs)
?
Focus establish business functions at alternate site
Identify
Continuity Strategies - 3/3 Components of Contingency Plan
Business Continuity (BCPs)
?
Before planning can begin, a team has to plan effort and prepare resulting documents
Identify
1/4 ? (continued)
Continuity Strategies
?
??: high-level manager to support, promote, and endorse findings of project
Identify
2/4 ? (continued)
- Continuity Strategies
- Champion
?
??: leads project and makes sure sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed
Identify
3/4 ? (continued)
- Continuity Strategies
- Project Manager
?
??: should be managers or their representatives from various communities of interest: business, IT, and information security
Identify
4/4 ? (continued)
- Continuity Strategies
- Team members
?
Investigate & assess impact of various attack
Identify
1/5 ?
Business Impact Analysis (BIA)
?
First risk assessment – then ?
Identify
2/5 ?
Business Impact Analysis (BIA)
?
Prioritized list of threats & critical info
Identify
3/5 ?
Business Impact Analysis (BIA)
?
Detailed scenarios of potential impact of each attack
Identify
4/5 ?
Business Impact Analysis (BIA)
?
Answers question: “if the attack succeeds, what do you do then?”
Identify
5/5 ?
Business Impact Analysis (BIA)
5 BIA (Business Impact Analysis) Sections
Enumerate
5 BIA Sections
- Threat attack identification & prioritization
- Business Unit analysis
- Attack success scenario development
- Potential damage assessment
- Subordinate Plan Classification
5 BIA (Business Impact Analysis) Sections
?
- Attack profile – detailed description of activities that occur during an attack
- Determine the extent of resulting damage
Identify
1/5 BIA Sections
Threat attack identification & prioritization