How can we help?

You can also find more resources in our Help Center.

49 terms

Management of Information Security Chapter 3

Chapter 3 of Management of Information Security, 3rd ed., Whitman and Mattford
STUDY
PLAY
Disaster recovery
_______ planning ensures that critical business functions can continue if a disaster
hierarchical
A ____ activation requires that the first person call designated people on the roster, who in turn call other designated people, and so on.
hot
A warm site offers many of the advantages of a(n) ________________ site, but at a lower cost.
Incident Response
_______________ is a set of procedures that commence when an incident is detected.
True
A(n) alert message is a scripted set of initial instructions used to respond to an incident.
False
Electronic vaulting involves the transfer of live transactions to an off-site facility.
False
The process of examining a possible incident and determining whether it constitutes an actual incident is called incident verification.
Statement of management commitment
Purpose and objectives of the policy
Scope of the policy
Definition of information security incidents
Organizational structure and delineation of roles
Prioritization or severity ratings of incidents
Reporting and contact forms
Performance measures
List the key components of a typical IR policy.
business impact analysis
The four components of contingency planning are the ____________________, the incident response plan, the disaster recovery plan, and the business continuity plan.
IR
The ____ plan focuses on the immediate response to an incident.
True
Crisis management entails a set of focused steps that deal primarily with the people involved in a disaster.
CP
The ____ team collects information about information systems and the threats they face, and creates the contingency plans for incident response, disaster recovery, and business continuity.
attack scenario end case
A(n) ____ shows the estimated cost of the best, worst, and most likely outcomes of an attack.
incident response
The ____________________ plan comprises a detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event that might compromise information resources and assets.
False
An organization should start documenting an incident after the incident has been contained.
incident
A(n) ____________________ occurs when an attack affects information resources and/or assets, causing actual damage or other disruptions.
after-action review
A(n) ____ entails a detailed examination of the events that occurred from first detection to final recovery.
True
The disaster recovery team is responsible for detecting, evaluating, and responding to disasters, and reestablishing operations at the primary business site.
emergency
As part of DR plan readiness, each employee should have two types of ____ information cards in his or her possession at all times.
business continuity
The ____________________ team is charged with setting up and starting off-site operations in the event of an incident or disaster.
structure walk-through
A(n) ____________________ is a method of testing contingency plans in which all involved individuals walk through the steps they would take during an actual event.
IT community of interest
The DRP is usually managed by the ____.
True
Activities at unexpected times are probable indicators of an actual incident.
electronic vaulting
The bulk batch-transfer of data to an off-site facility is known as ________________.
Database shadowing
____ is the storage of duplicate online transaction data, along with the duplication of the databases at the remote site on a redundant server.
incident
In CP, an unexpected event is called a(n) ____.
CEO
The BC Plan is most properly managed by the ____.
alert message
A scripted set of instructions about an incident is known as a(n) ____.
incident damage assessment
The immediate determination of the scope of the breach of confidentiality, integrity, and availability of information and information assets is called ____________________.
False
A structured walk-through is the simplest kind of validation for reviewing the perceived feasibility and effectiveness of the contingency plan.
hot site
A ____ is a fully configured computer facility that needs only the latest data backups and the personnel to function.
A simulation
____ is a method of testing contingency plans in which each involved person works individually to simulate the performance of each task.
True
The presence of hacker tools in a system definitely signals that an incident is in progress or has occurred.
alert roster
A(n) ____________________ is a document containing contact information of the individuals to notify in the event of an actual incident.
incident classification
____ is the process of examining a possible incident and determining whether it constitutes an actual incident.
False
A(n) attack scenario consists of a detailed description of the activities that usually occur during an attack.
False
Parallel testing is the most rigorous strategy for testing contingency plans.
people
Crisis management is designed to deal primarily with ____.
contingency planning
The overall process of preparing for unexpected events is called _________________.
True
Rapid-onset disasters occur suddenly, and may take the lives of people and destroy the means of production.
True
Continuous process improvement (CPI) suggests that each time the organization rehearses its plans, it should learn from the process, improve the process, and then rehearse again.
True
A(n) champion is an executive who supports, promotes, and endorses the findings of the CP project.
False
A(n) structured walk-through is a method of testing contingency plans in which each involved person works individually to simulate the performance of each task that he or she is responsible for.
CISO
A project manager—possibly a mid level manager or even the ____________________ — leads the project, putting in place a sound project planning process, guiding the development of a complete and useful project, and prudently managing resources.
rapid-onset
Disasters that occur suddenly, with little warning, are classified as ____________________ disasters.
incident damage assestment
A(n) ____ determines the extent of the breach of confidentiality, integrity, and availability of information and information assets.
True
Classifying an incident is the responsibility of the IR team.
mutual agreement
A contract between two organizations in which each party agrees to assist the other in the event of a disaster is called a ____.
alert roster
A document that contains contact information on the individuals to be notified in the event of an actual incident is called a(n) ____.