Module 10: Incident Recovery Flashcards
What is Incident Recovery
A process of restoring and rebuilding operations that are affected due to security incidents such as malicious code attacks, hacking attacks, etc.
What does recovery of systems involve
Validating the systems and monitoring them for any further infection
TRUE or FALSE: Incident recovery is part of business continuity
TRUE
TRUE or FALSE: Incident recovery helps users to determine the root cause of an incident
TRUE
How does incident recovery help with future incidents
Helps in preventing or avoiding the similar incidents in future
After the system has recovered from the incident what is the next suggested step
To perform a vulnerability assessment or pen test in order to identify the possible existing vulnerabilities
Would it be possible to have incident recovery without the support of the higher management
No, they are an essential first step cause they can make it an official policy
It is important to to assess the organization on a regular basis but what are some factors that should be taken into consideration when performing this analysis
- Environmental
- Economic
- Social
- Political condition
TRUE or FALSE: Incident recovery plan enforces policies in order to achieve the vital needs of the business operation with confined rules and regulations
FALSE
Incident recovery plan enforces LAW and policies
TRUE or FALSE: Incident recovery planning documentation defines what only the managers responsible for declaring, responding, and recovering from an incident
FALSE
You also need to include the roles of internal and external departments
Who is in charge of implementation and monitoring of all the policies and procedures regarding incident recovery
Senior managers and incident recovery staff
TRUE or FALSE: Employees in the organization must be trained to identify and locate unexpected problems
TRUE
What are the Incident Recovery steps
- System Restoration (restore through backups)
- System Validation (System needs to be connected to the LAN and tested)
- System Operations (Updating and patching the system regularly)
- System Monitoring (Use alerts and tools to monitor the system and its traffic to help identify intruders and attackers)
How does a contingency plan help
Enables organizations to develop and maintain effective methods to handle emergencies
Why is Starting Point important in a contingency planning
Helps to develop and maintenance of the contingency plan in advance.