Incident Response, business Continuity & Disaster Recovery Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Event

Any observable occurrence in a network or system.

2
New cards

Incident

An event that actually or potentially jeopardizes the the C-I-A of an

information system or the information the system processes, stores or transmits.

3
New cards

Intrusion

A security event, or combination of events, that constitutes a deliberate

security incident in which an intruder gains, or attempts to gain, access to a system or

system resource without authorization.

4
New cards

Breach

The loss of control, compromise, unauthorized disclosure or acquisition, or

any similar occurrence where: a person other than an authorized user accesses or

potentially accesses personally identifiable information; or an authorized user

accesses personally identifiable information for other than an authorized purpose.

5
New cards

Exploit

The specific attack.

6
New cards

Threat

Any circumstance or event with the potential to adversely impact either national or

organizational operations, assets, individuals through an information system via unauthorized

access, destruction, disclosure, modification of information and/or denial of service.

7
New cards

Vulnerability

Weakness in an information system, system security procedures, internal

controls or implementation that could be exploited by a threat source.

8
New cards

Zero Day

A previously unknown system vulnerability with the potential of exploitation

without risk of detection or prevention because it does not, in general, fit recognized patterns,

signatures or methods.

9
New cards

Preparation

Since incident will happen and adverse events will affect

business mission and objectives. This requires having a policy and a

response plan that will lead the organization through the crisis. For severe

incidents, some organization defines this as “Crisis Management”

10
New cards

Protect life, health and safety

Any decision and incident responder will

make should priority safety.

11
New cards

Reduction of impact

An IR process aims this so that organization can

prevent or resume operations as soon as possible.

12
New cards

Preparation, Detection and Analysis, Containment, Eradication and Recovery, Post-incident Activity

Components of an IR Plan

13
New cards

Preparation

Develop a policy approved by management.

• Identify critical data and systems, single points of failure.

• Train staff on incident response.

• Implement an incident response team.

• Practice Incident Identification. (First Response)

• Identify Roles and Responsibilities.

• Plan the coordination of communication between

stakeholders.

• Consider the possibility that a primary method of

communication may not be available.

14
New cards

Detection and Analysis

Monitor all possible attack vectors.

• Analyze incident using known data and threat intelligence.

• Prioritize incident response.

• Standardize incident documentation.

15
New cards

Containment

Gather evidence.

• Choose an appropriate containment strategy.

• Identify the attacker.

• Isolate the attack.

16
New cards

Post-Incident Activity

• Identify evidence that may need to be retained.

• Document lessons learned.

17
New cards

Incident Response Team

Should be cross-functional group of individuals which will represent the

management, technical and functional areas of responsibility most

directly impacted by a security incident. They should be from:

•Representative(s) of senior

management

•Information security professionals

•Legal representatives

•Public affairs/communications

representatives

•Engineering representatives

(system and network)

18
New cards

Security Operations Center

SOC

19
New cards

Security Operations Center or (SOC)

is a team composed of security analyst who

triages alerts, identify potential incidents which will be passed thru Incident Response

Team.

20
New cards

IR Team

Assist with investigating the incident. Their primary responsibilities are:

• Determine the scope of damage caused by the

incident.

• Identify whether any confidential information

was compromised.

• Implement any necessary recovery procedures

to restore security and recover from the

related damage.

• Supervise the implementation of any

additional security measures to improve

security and prevent recurrence.

21
New cards

business continuity plan

BCP

22
New cards

business continuity plan (BCP)

is the proactive

development of procedures to restore business operations

after a disaster or other significant disruption to the

organization. It needs to sustain business operations while

recovering from a significant disruption.

23
New cards

Communication

is a a key part of the BCP, this should

have multiple methodologies in case of disruption of

power, network or any other primary communications.

24
New cards

Disaster recovery plan

DRP

25
New cards

Disaster recovery plan (DRP)

guides the actions of emergency response personnel until the end goal is reached—which is to see the business restored to full last-known reliable operations

26
New cards

Business continuity planning

is about maintaining

critical business functions, disaster recovery

planning is about restoring IT and communications

back to full operations after a disruption.

27
New cards
28
New cards
29
New cards

Explore top flashcards