ISM6326 - Chapter 14

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

Active Logging

Maintaining active logs regarding the reconnaissance activities conducted by the attacker

2
New cards

After-Action Report

A report to analyze the exercise results with the purpose of identifying strengths to be maintained and weaknesses to be addressed for improvement

3
New cards

Alternative Business Practices

Workaround activities that can temporarily substitute for normal business activities

4
New cards

Alternative Processing Site

A different location to be used for processing data

5
New cards

Backup Utilities

Software that can be used for performing backups

6
New cards

Business Continuity

The ability of an organization to maintain its operations and services in the face of a disruptive event

7
New cards

Capture Video

Using a video camera to clearly document the entire process of a forensics investigation

8
New cards

Capturing the System Image

Taking a snapshot of the current state of the computer that contains all current settings and data

9
New cards

Chain of Custody

A process of documentation that shows that the evidence was always under strict control and no unauthorized individuals were given the opportunity to corrupt the evidence

10
New cards

Cold Site

A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations

11
New cards

Containment

An action step in the incident response process that involves limiting the damage of the incident and isolating those systems that are impacted to prevent further damage

12
New cards

Cyber-Incident Response Team

A group responsible for responding to security incidents

13
New cards

Data Backup

The process of copying information to a different medium and storing it at an offiste location so that it can be used in the event of a disaster

14
New cards

Data Sovereignty

The concept that data stored in a digital format is subject to the laws of the country in which the storage facility resides

15
New cards

Differential Backup

A backup that copies any data that has changed since last full backup

16
New cards

Disaster Recovery Plan (DRP)

A written document that details the process for restoring IT resources following an event that causes a significant disruption in service

17
New cards

Distance

A factor in the location selection of an off-site backup

18
New cards

Documented Incident Definitions

An outline that defines in detail what is and is not an incident that requires a response

19
New cards

Electromagnetic Interference (EMI)

Electromagnetic fields emitted from technology devices that can result in interference

20
New cards

Electromagnetic Pulse (EMP)

A short duration burst of energy by the source

21
New cards

Eradication

An action step in the incident response process that involves finding the cause of the incident and temporarily removing any systems that may be causing damage

22
New cards

Exercises

Simulated attack activites

23
New cards

Failover

Moving data input and output processes from the primary location to the alternative processing site

24
New cards

Faraday Cage

A metallic enclosure that prevents the entry or escape of an electromagnetic field

25
New cards

Fault Tolerance

A system’s ability to deal with malfunctions

26
New cards

Fire Suppression

Attempts to reduce the impact of a fire

27
New cards

Forensics (Forensic Science)

The application of science to questions that are of interest to the legal profession

28
New cards

Full Backup

The starting point for all backups that copies the entire set of data

29
New cards

High Availability

A system that can function for an extended period of time with little downtime

30
New cards

Hot Aisle/Cold Aisle

A layout in a data center that can be used to reduce heat by managing air flow

31
New cards

Hot Site

A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link

32
New cards

Identification of Critical Systems

Distinguishing important functions that make up the mission-essential functions in an organization

33
New cards

Impact on Finance

The impact of a loss of monetary funding on business operations

34
New cards

Impact on Life

The impact on human wellbeing

35
New cards

Impact on Property

The impact of a loss of tangible assets on business operations

36
New cards

Impact on Reputation

The impact of a loss of status on business operations

37
New cards

Impact on Safety

The impact of a loss of physical protection on business operations

38
New cards

Incident Response Plan (IRP)

A set of written instructions for reacting to a security incident

39
New cards

Incident Response Process

Action steps to be taken when an incident occurs

40
New cards

Incremental Backup

A backup that copies any data that has changed since last full backup or last incremental backup

41
New cards

Legal Hold

A notification sent from the legal team to employees instructing them not to delete electronically stored information or paper documents that may be relevant to an incident

42
New cards

Legal Implications

Consequences as determined by law of off-site backups

43
New cards

Lessons Learned

An action step in the incident response process that involves completing incident documentation and performing detailed analysis to increase security and improve future response efforts

44
New cards

Location Selection

A consideration of where an off-site backup should be stored

45
New cards

Mean Time Between Failures (MTBF)

A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced

46
New cards

Mean Time to Recovery (MTTR)

The average time for a device to recover from a failure that is not a terminal failure

47
New cards

Mission-Essential Function

The activity that serves as the core purpose of the enterprise

48
New cards

Network Traffic Logs

Recorded information about any network activity used in a forensics investigation

49
New cards

Off-Site Backup

A backup should be stored at a different location

50
New cards

Order of Restoration

The sequence in which different systems are reinstated

51
New cards

Order of Volatility

The sequence in which volatile data must be preserved in a computer forensic investigation

52
New cards

Preparation

An action step in the incident response process that involves equipping IT staff, management, and users to handle potential incidents when they arise

53
New cards

Preservation of the Evidence

Ensuring the important proof is not destroyed

54
New cards

Privacy Impact Statement

Part of a BIA that is used to identify and mitigate privacy risks

55
New cards

Privacy Threshold Assessment

Part of a BIA that is used to determine if a system contains PII, whether a privacy impact assessment is required, and if any other privacy requirements apply to the IT system

56
New cards

RAID (Redundant Array of Independent Drives)

A technology that uses multiple hard disk drives for increased reliability and performance

57
New cards

Recovery

The maximum length of time that an organization can tolerate between backups

58
New cards

Recovery Point Objective (RPO)

The maximum length of time that an organization can tolerate between backups

59
New cards

Recovery Time Objective (RTO)

The length of time it will take to recover data that has been backed up

60
New cards

Redundancy

The use of duplicated equipment to improve the availability of the system

61
New cards

Reporting Requirements/Escalation

A process for indicating to whom information should be distributed and at what point the security event has escalated to the degree that specific actions should be implemented

62
New cards

Roles and Responsibilities

Clearly designated duties of the members of a cyber-incident response team

63
New cards

Screenshot

Capturing the current image on the screen in a forensic investigation

64
New cards

Single Point of Failure

A component or entity in a system which, if it no longer functions, would adversely affect the entire system

65
New cards

Snapshot

  1. A backup composed of a series of “reference markers” of the data a ta specific point in time 2. An image of a virtual machine

66
New cards

Strategic Counterintellgience

An in depth application of strategic intelligence that involves gaining information about the attacker’s intelligence collection capabilities

67
New cards

Strategic Intelligence

The collection, processing, analysis, and dissemination of intelligence for forming policy changes

68
New cards

Tabletop Exercises

Exercises that simulate an emergency situation but in an informal and stress-free environment

69
New cards

Time Offset

The amount of time added to or subtracted from UTC to arrive at the current local time

70
New cards

Track Man Hours

Monitoring time in a forensics investigation

71
New cards

Warm Site

A remote site that contains computer equipment but does not have active internet or telecommunication facilities, and does not have backups of data

72
New cards

Witness Interviews

Speaking with those present who saw the event or had access to the system in question