Business Continutiy/Disaster Recovery 4370

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

68 Terms

1
New cards

what contributed to 1/3 of frauds

internal control weaknesses

2
New cards

what is the best detection method to limit fraud duration and loss?

IT controls

3
New cards

what are the primary internal control weaknesses that contribute to fraud

  1. lack of internal controls

  2. ovveride existing internal controls

  3. Lack of management review

  4. lack of competent personnel oversight in role

  5. poor tone at the top

  6. lack of independent checks/audits

  7. other

4
New cards

top 12 risks

  1. cyber attacks (state-sponsored)

  2. cyber attacks (criminal)

  3. major It interruption

  4. information security

  5. privacy and data protection laws

  6. serious supply chain distribution

  7. failure of critical national infrastructure

  8. extreme violence

  9. terrosits attacks

  10. pandemic

  11. a man made disaster

  12. wide scale flooding

5
New cards

Natural Disasters

Random problems that cannot be prepared for

6
New cards

Types of outages

natural diasters

man made disasters

subset of both

7
New cards

man made disasters

  • sabotage of property, computer systems, information

  • terrorist

  • strikes/protest

  • denial of service

  • viruses

8
New cards

subset of both natural and man made disasters

  • infrastructure failures

  • communication failures

  • transportation outages

9
New cards

Causes for Unavailability of Critical Business Systems

  • hard/software failure

  • Telecomms failure

  • third party failure

  • operational error

  • malicious technical acts

10
New cards

what are the benefits of BCM

  1. reduced time to identify/contain data breaches

  2. valuable to incident response planning

  3. reduces costs of data breach

  4. substantial costs per day savings

  5. reduces data breaches

  6. minimizes distributions to operations

  7. improves resilience of IT operations

  8. diminishes negative impact on reputation

  9. DR automation reduces costs per day

11
New cards

ISO/IEC 38500:2008

provides guiding principles for directors of organizations on the effective, efficient, and acceptable use of Information Technology (IT) within their organizations.

12
New cards

who does ISO/IEC 38500:2008 guide

senior managers;

members of groups monitoring the resources within the organization;

external business or technical specialists, such as legal or accounting specialists, retail associations, or professional bodies;

vendors of hardware, software, communications and other IT products;

internal and external service providers (including consultants);

IT auditors.”

those involved in designing and implementing the management system of those policies and processes that support governance.

13
New cards

The objectives of the ISO 38500 standard are:

Assuring stakeholders that they can have confidence in the organization's corporate governance of IT

Informing/guiding Directors in governing the use of IT in their organization

Providing a basis for objective evaluation of the corporate governance of IT

14
New cards

ISO 22301:2012 Societal security - Business continuity management systems - Requirements

formally specifies a Business Continuity Management System (BCMS) for any type or size of organization.

15
New cards

what accompanies and expands ISO 22301

ISO 22313:2012 Societal security

16
New cards

KEY CLAUSES OF ISO 22301:2012

Clause 4: Context of the organization

Clause 5: Leadership

Clause 6: Planning

Clause 7: Support

Clause 8: Operation

Clause 9: Performance evaluation

Clause 10: Improvement

17
New cards

Key concepts to understand in understanding your business context

  • Maximum Acceptable Outage (MAO)

  • Minimum Business Continuity Objective (MBCO)

18
New cards

Maximum Acceptable Outage (MAO)

The time it would take for adverse impacts to become unacceptable. This is the same as ‘maximum tolerable period of disruption (MTPD)

19
New cards

Minimum Business Continuity Objective (MBCO)

the minimum level of services and/or products that is acceptable to the organization to achieve its business objectives during a disruption.

20
New cards

Business Impact Analysis (BIA) identifies

the critical processes that support its key products and services, and

the interdependencies between processes and the resources required to operate the processes at a minimally-acceptable level.

21
New cards

General Structure of a capability Map

It capabilities supporting business process → Business Processes comprising business capabilities → Needed Business Capabilities in order to achieve performance outcomes →Metrics indicating business model success → Business Model

22
New cards

Metrics indicating business model success:

Financial Performance Outcomes

Customer/Client Performance Outcomes

23
New cards

Business Model

Customer Value Proposition

Profit Model

24
New cards

Stages of BIA

Threat attack identification and prioritization

Business unit analysis

Attack success scenario development

Potential damage assessment

Subordinate plan classification

25
New cards

what does BIA assume

security controls have been bypassed, have failed, or have proven ineffective, and attack has succeeded

26
New cards

what iso standard to apply to implement risk assessment

ISO 31000

27
New cards

Goal risk assessment

is to establish, implement, and maintain a formal documented risk assessment process that systematically identifies, analyzes, and evaluates the risk of disruptive incidents to the organization.

28
New cards

what is an integral component of corporate strategy

The business continuity strategy

29
New cards

When to create a business continuity strategy?

After requirements have been established through the BIA and the risk assessment

30
New cards

Business continuity strategy

enable the organization to protect and recover critical activities based on organizational risk tolerance and within defined recovery time objectives.

31
New cards

Business continuity procedures

establish an appropriate internal and external communications protocol

be specific regarding the immediate steps that are to be taken during a disruption

be flexible to respond to unanticipated threats and changing internal and external conditions

focus on the impact of events that could potentially disrupt operations

be developed based on stated assumptions and an analysis of interdependencies

be effective in minimizing consequences through implementation of appropriate mitigation strategies

32
New cards

why should procedures be documented?

to ensure continuity of activities and management of a disruptive incident.

33
New cards

How to ensure continuity procedures are consistent with objectives?

test them regularly.

34
New cards

Exercising and testing

are the processes of validating business continuity plans and procedures to ensure the selected strategies are capable of providing response and recovery results within the timeframes agreed to by management.

35
New cards

ISO/IEC 27031:2011 Information technology

Security techniques — Guidelines for information and communications technology readiness for business continuity

36
New cards

ICT Readiness for Business Continuity (IRBC)

a general term for the processes described in the standard] supports Business Continuity Management (BCM) “by ensuring that the ICT services are as resilient as appropriate and can be recovered to pre-determined levels within timescales required and agreed by the organization.”

37
New cards

ICT readiness encompasses

  • Preparing organization’s ICT against unforeseeable events that could change the risk environment and impact ICT and business continuity

  • Leveraging and streamlining resources among business continuity, disaster recovery, emergency response and ICT security incident response and management activities.

38
New cards

ICT readiness is important for business continuity purposes because

ICT is prevalent and many organizations are highly dependent on ICT supporting critical business processes;

ICT also supports incident, business continuity, disaster and emergency response, and related management processes;

Business continuity planning is incomplete without adequately considering and protecting ICT availability and continuity.

39
New cards

A business continuity plan comprises

an organization’s strategies to prepare for future national, regional or local crises that could jeopardize its capacity to continue with its core mission, as well as its long term stability

40
New cards

Business continuity management is an integral part of

holistic risk management

41
New cards

ISO 31000 Risk management

recognizes the variety of the nature, level and complexity of risks and provides generic guidelines on principles and implementation of risk management. To apply these generic guidelines in a specific situation, this International Standard sets out how an organization should understand the specific context in which it implements risk management

42
New cards

risk management process

  1. establish context

  2. identify risks

  3. analyze risks

  4. evaluate risks

  5. treat risks

  6. monitor

  7. communicate

43
New cards

Disaster recovery planning (DRP

is planning the preparation for, and recovery from, a disaster

44
New cards

contingency planning team must decide

which actions constitute disasters and which constitute incidents

45
New cards

Continuity Strategies

Incident response plans (IRPs); disaster recovery plans (DRPs); business continuity plans (BCPs)

46
New cards

what does IRP focus on

focuses on immediate response; if attack escalates or is disastrous, process changes to disaster recovery and BCP

47
New cards

DRP focus

typically focuses on restoring systems after disasters occur; as such, is closely associated with BCP

48
New cards

BCP

occurs concurrently with DRP when damage is major or long term, requiring more than simple restoration of information and information resources

49
New cards

what is the simpliest continuity strategy?

BCP

50
New cards

Development of BCP

selecting a continuity strategy and

integrating off-site data storage and recovery functions into this strategy

51
New cards

Example strategy:

Keep 3 copies of data: 1 primary, 2 backups

Use 2 different types of media

Keep 1 set in the cloud in DRaaS (disaster recovery as a service) or BaaS (backup as a service)

52
New cards

DRaaS

  • public cloud

  • private cloud

  • managed cloud services

53
New cards

public cloud

– typically uses customer‐managed software for setting up and controlling cloud-based DR resources

54
New cards

private cloud

typically uses customer‐managed software for setting up and controlling cloud-based DR resources

55
New cards

managed cloud services

cloud offering includes DRaaS as a part of a standard, hands‐free offering

56
New cards

Dedicated recovery site options

hot warm cold sites

57
New cards

which sites are fully operational

hot

58
New cards

which sites have fully optional hardware but no software

warm

59
New cards

cold sites

rudimentary services and facilities

60
New cards

shared site options

  • time share

  • service bureaus

  • mutual agreement

61
New cards

time share

A hot, warm, or cold site that is leased in conjunction with a business partner or sister organization

62
New cards

Service Bureaus / Cloud Providers

An agency that provides a service for a fee

63
New cards

Mutual agreement

A contract between two or more organizations that specifies how each will assist the other in the event of a disaster.

64
New cards

Options for getting operations up and running include

Electronic vaulting

Remote journaling

Database shadowing

Cloud storage

65
New cards

PP2. Risk Assessment

Identify risks that could impact an entity’s resources, processes or reputation.

Assess risks to determine the potential impacts to the entity, enabling the entity to determine the most effective means to reduce them.

66
New cards

PP3. Business Impact Analysis

Identify and prioritize all of the entity’s functions, processes, and dependencies in order to determine the greatest impact upon the entity should the functions not be available. This analysis should be retained and available to assist the entity in understanding incidents and/or the resulting consequences. Quantify the impact to the entity, its services, and the affected parties.

Analyze, document, and communicate the findings to highlight all gaps between the entity’s requirements and its current capabilities.

67
New cards

Major steps in contingency plan

  1. BIA

  2. IRP

  3. DRP

  4. BCP

68
New cards

What is a Business Impact Analysis (BIA)

Investigation and assessment of the impact that various risks or attacks can have on the organization