Sec+ 13-15 Communicate Operational Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

Business Continuity

Organization's ability to maintain operations after a disruptive event.

2
New cards

Disaster Recovery Plan (DRP)

Written document detailing process for restoring IT resources following a disruptive event.

3
New cards

Business Impact Analysis (BIA)

Analyzes most important business functions and quantifies impact of their loss.

4
New cards

Single Point of Failure

Component or entity that will disable the entire system if it no longer functions.

5
New cards

Risk Assessment

Determining exposure to threats and assessing the impact if threats are realized.

6
New cards

Vulnerability Assessment

Systematic evaluation of asset exposure to risks and threats.

7
New cards

Disaster Recovery

Subset of business continuity planning focused on protecting and restoring IT functions.

8
New cards

Mean Time Between Failure (MTBF)

Average time until a component fails and must be replaced.

9
New cards

RAID Level 0

Striped disk array without fault tolerance, distributes data across multiple drives.

10
New cards

Recovery Time Objective (RTO)

Length of time it will take to recover backed up data.

11
New cards

Fire Suppression Systems

Methods and technologies used to extinguish or prevent fires.

12
New cards

Environmental Controls

Techniques to prevent disruption caused by environmental factors such as fire.

13
New cards

Incident Response Procedures

Response steps taken when an unauthorized incident occurs.

14
New cards

Chain of Custody

Process of maintaining control and tracking of evidence during an investigation.

15
New cards

Honeypot

A computer protected by minimal security to attract and analyze attacks.

16
New cards

Vulnerability Scanning

Automated process searching for known security weaknesses in systems.

17
New cards

Penetration Testing

Testing conducted to exploit system weaknesses to reveal vulnerabilities.

18
New cards

Security Policy

Document outlining protections to ensure an organization's assets face minimal risks.

19
New cards

Data Backup

Copying information to a different medium and storing it for use in an event of disaster.

20
New cards

Change Management

Methodology for making modifications while tracking changes and mitigating risks.

21
New cards

Privilege Management

Process of assigning and revoking access privileges to systems and data.

22
New cards

Continuous Data Protection (CDP)

Data backup method that allows for immediate restoration of data.

23
New cards

Risk Mitigation

Determining how to deal with risks and establish how much risk can be tolerated.

24
New cards

Critical Business Function

Essential operations necessary for the organization's survival.

25
New cards

Threat Analysis

Identification and evaluation of potential threats to an organization.

26
New cards

Impact Assessment

Process of determining the effects of disruption on business operations.

27
New cards

Resource Requirements

Essential resources needed for recovery after a disaster.

28
New cards

Testing and Maintenance

Regular check-ups and updates on disaster plans to ensure effectiveness.

29
New cards

Emergency Response Plan

Guidelines for responding to emergencies to ensure safety and security.

30
New cards

Supply Chain Risk Management

Strategies to identify and mitigate risks in the supply chain.

31
New cards

Business Continuity Plan (BCP)

A strategy to ensure that critical business functions can continue during a crisis.

32
New cards

Data Loss Prevention (DLP)

Strategies used to prevent data breaches and loss of sensitive information.

33
New cards

Incident Management

Process of managing and responding to incidents to minimize impact.

34
New cards

Business Continuity is the organization's ability to maintain ______________ after a disruptive event.

operations

35
New cards

A Disaster Recovery Plan (DRP) is a ____________ document detailing the process for restoring IT resources following a disruptive event.

written

36
New cards

The process of analyzing the most important business functions and quantifying the impact of their loss is called _____________.

Business Impact Analysis (BIA)

37
New cards

A ______________ Point of Failure is a component or entity that will disable the entire system if it no longer functions.

Single

38
New cards

Risk Assessment involves determining exposure to ____________ and assessing the impact if threats are realized.

threats

39
New cards

A systematic evaluation of asset exposure to risks and threats is referred to as a ______________ Assessment.

Vulnerability

40
New cards

__________ Time Objective (RTO) indicates the length of time it will take to recover backed up data.

Recovery

41
New cards

Example of environmental controls includes methods and technologies used to ___________ or prevent fires.

extinguish

42
New cards

A ____________ plan provides guidelines for responding to emergencies to ensure safety and security.

Emergency Response

43
New cards

Data ___________ is the process of copying information to a different medium to be used in the event of a disaster.

Backup

44
New cards

What is Business Continuity?

The organization's ability to maintain operations after a disruptive event.

45
New cards

What does a Disaster Recovery Plan (DRP) entail?

A written document detailing the process for restoring IT resources following a disruptive event.

46
New cards

What is the purpose of a Business Impact Analysis (BIA)?

To analyze the most important business functions and quantify the impact of their loss.

47
New cards

Define Single Point of Failure.

A component or entity that will disable the entire system if it no longer functions.

48
New cards

What is Risk Assessment?

Determining exposure to threats and assessing the impact if threats are realized.

49
New cards

Describe Vulnerability Assessment.

A systematic evaluation of asset exposure to risks and threats.

50
New cards

What is the focus of Disaster Recovery?

Protecting and restoring IT functions as part of business continuity.

51
New cards

What does Mean Time Between Failure (MTBF) measure?

Average time until a component fails and must be replaced.

52
New cards

What does Recovery Time Objective (RTO) indicate?

The length of time it will take to recover backed up data.

53
New cards

What are Fire Suppression Systems designed for?

To extinguish or prevent fires.