Chapter 2 Flashcards

(14 cards)

1
Q

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for other than an authorized purpose.

A

Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

any observable occurrence in a network or system.

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A particular attack. It is named this way because these attacks exploit system vulnerabilities.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits.

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security event, or combination of events, that constitutes a deliberate security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization.

A

Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a threat source.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods.

A

Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the components commonly found in incident response plan

A
  1. Preparation
  2. Detection and Analysis
  3. Containment, Eradication and Recovery
  4. Post-incident activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a cross-functional group of individuals who represent the management, technical and functional areas of responsibility most directly impacted by a security incident.

A

Incident response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

guides the actions of emergency response personnel until the end goal is reached—which is to see the business restored to full last-known reliable operations.

A

Disaster recovery plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

refers specifically to restoring the information technology and communications services and systems needed by an organization, both during the period of disruption caused by any event and during restoration of normal services.

A

Disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key Components of a Disaster Recovery Plan (5

A

Business Impact Analysis
Recovery Strategies
Plan Development
Testing and Maintenance
Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly