Writing Assignment: Module 02 Flashcards

1
Q

List and describe three of the applicable U.S. laws that impact contingency planning.

A

The Computer Fraud and Abuse (CFA) Act of 1986 made it a federal crime to access a protected computer without proper authorization.

The Electronic Communications Privacy Act (ECPA) of 1986 protects wire, oral, and electronic communications even while those communications are being made and are in transit.

Health Insurance Portability and Accountability Act (HIPAA) of 1996 protect sensitive patient health information from being disclosed without the patient’s consent or knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the first step in beginning the contingency planning process?

A

To begin the process of planning for contingencies, an organization must first establish an entity that will be responsible for the policy and plans that will emerge from the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the primary responsibilities of the contingency planning management team (CPMT)?

A

Obtaining commitment and support from senior management

Managing and conducting the overall CP process

Writing the master CP document

Conducting the business impact analysis (BIA).

Organizing and staffing the leadership for the subordinate teams.
* Incident response
* Disaster recovery
* Business continuity
* Crisis management

Providing guidance to, and integrating the work of, the subordinate teams, including subordinate plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which teams may be subordinate to the CPMT in a typical organization?

A

Organizing and staffing the leadership for the subordinate teams, including:

Incident response planning (IRPT) and response teams

Disaster recovery planning (DRPT) and response teams

Business continuity planning (BCPT) and response teams

Crisis management planning (CMPT) and its specific response teams, if they are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The CP process will fail without what critical element?

A

aligning a formal commitment of senior executive management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three communities of interest, and why are they important to CP?

A

*Managers and practitioners in information security
*Managers and practitioners in information technology
*Managers and professionals from general management

-Information security management and professionals:
*Focus on integrity and confidentiality of systems
May lose sight of the objective of availability

-Information technology management and professionals:
*Design, build, and operate information systems
*Focus on costs of system creation and operation, ease of use, timeliness, transaction response time, etc.

-Organizational management and professionals:
*Includes executives, production management, HR, accounting, legal, etc. - the users of IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the elements needed to begin the CP process?

A

*Planning methodology
*Policy environment to enable the planning process
*Business impact analysis
*Planning budget: access to resources

The elements required to begin the CP process are a (1) planning methodology; a (2) policy environment to enable the planning process; (3)an understanding of the causes and effects of core precursor activities, known as the business impact analysis (BIA); and (4) access to financial and other resources, as articulated and outlined by the planning budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the major sections in the CP policy document?

A

An introductory statement of philosophical perspective by senior management as to the importance of contingency planning to the strategic, long-term operations of the organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a business impact analysis (BIA), and why is it important?

A

Business Impact Analysis (BIA):
*An investigation and assessment of the impact of various types of attacks
*Provides detailed scenarios of the effects of each potential type of attack
-BIA assumes that risk management controls have been bypassed, have failed, or were ineffective
-BIA addresses what to do if the attack succeeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the usual stages in the conduct of the BIA?

A
  1. Assessing mission/business processes and recovery criticality
  2. Identifying resource requirements
  3. Identifying recovery priorities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a business process?

A

an activity or set of activities that accomplish a specific organizational goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When confronted with many business functions from many parts of the organization, what tool can an organization use to determine which function is the most critical?

A

weighted analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the most common downtime metrics used to express recovery criticality?

A
  1. Maximum tolerable downtime (MTD) 2. Recovery time objective (RTO) 3. Recovery point objective (RPO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is maximum tolerable downtime (MTD)?

A

any amount of time until it’s disrupted without causing harm to the organization’s mission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is recovery time objective (RTO)?

A

period of time within which systems, application, or functions can be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is recovery point objective (RPO), and how does it differ from recovery time objective?

A

point in time to which lost systems and data can be recovered, Also known as maximum acceptable data loss.

17
Q

What are the primary means for collecting data for the BIA?

A

-Online questionnaires
-Facilitate data-gathering sessions
-Process flows and interdependency studies
-Risk assessment research
-IT application or system logs
-Financial reports and departmental budgets
-BCP/DRP audit documentation
-Production schedules

18
Q

What is a facilitated data-gathering session?

A

Collects information directly from end users and business managers

19
Q

What are some items usually included in routine IT operations budgets that can be considered part of CP requirements?

A

Business Continuity Budgeting:
*Requirements to maintain service contracts, such as mobile equipment, and temporary sites
*Employee overtime

20
Q

Beyond the items funded in the normal course of IT operations, what are the additional budgeting areas for CP needs?

A
  • Incident Response Budgeting:
    *Usually part of a normal IT budget
    *Includes data backup and recovery, UPSs, anti-virus software, anti-spyware software, RAID drives, storage-area networks (SANs), etc.
    *Should also include maintenance of redundant equipment to handle equipment failures
    *Rule of 3: keep 3 levels of computer system environments available for essential redundancy (hot, warm, and cold)

Disaster Recovery Budgeting:
*Insurance covers rebuilding and reestablishing operations at the primary site
*Consider data loss policies
*Other items not covered by insurance, such as loss of services (water, electricity, data), etc.