MIS515 - Week 4 - Continuity Planning

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Why are business unit analysis important in a BIA process?

Helps planners identify and prioritize critical unit functions

Match the following continuity site strategies with their respective descriptions

Hot site = fully configured computer facility with all services Warm site = functional site but without applications and not kept fully prepared Cold site = rudimentary services and facilities Mutual Agreement = Contract of assist between two organizations Service Bureau = Agency that provide physical facilities

Which of the following are major contingency planning areas of consideration

IRP DRP BCP

Virtualization reduces complexity and downtime by allowing complete virtual servers to be moved from one physical server to another (both running a virtualized environment) for system maintenance or prior to system failure.

TRUE

Virtualized servers can be easily backed up to remote virtual installations because the virtual server is encapsulated in its own snap-shot or save-set provile.

TRUE

Place the steps of the contingency planning process in the correct order

1. Develop Contingency Plan Policy 2. Create Business Impact Analysis 3. Identify Preventive Controls 4. Develop Recovery Strategies 5. Develop Contingency Plans 6. Plan, Testing, Training & Exercises 7. Plan Maintenance

Place the following planning events in their most proper order.

1. Organizational Strategy 2. Information Technology Strategy 3. Information Security Strategy 4. Information Security Tactical Planning 5. Information Security Operational Planning

Place the following information security program life cycles in their proper order

1. Plan & Organize 2. Implement 3. Operate & Manage 4. Monitor & Evaluate

Place the BIA task in proper order

1. Threat/Attack identification and prioritization 2. Business Unit Analysis 3. Attack scenario development 4. Potential damage assessment 5. Subordinate plan classification

When a threat becomes a valid attack, it is classified as an information incident if:

- It is directed against information assets - it threatens the confidentiality, integrity or availability of information assets - it has realistic chance of success

Many organizations are moving to virtualized infrastructures because (select all that apply)

- it reduces physical server counts - it reduces power & HVAC - it reduces downtimes

Oreck's disaster recovery plan was to use their New Orleans site int he case of a disaster at Long Beach and visa-versa.

TRUE

What is an after action review?

A detailed examination of the events that occurred; what worked and what did not work.

Planning is a process that creates and implements strategies oriented towards the accomplishment of organizational objectives

TRUE

Policies must have enforced consequences to be effective.

TRUE

Which of the following is true regarding virtualization?

ALL OF THE ABOVE - It allows multiple operating systems and applications to share a single physical server - It makes more efficient use of server resources that traditional physical-server-per-service methods - It reduces power, HVAC and hardware footprint requirements in a data center -It is easier to deploy and manage servers and services than traditional approaches

Which of the following would NOT be an element of a security program?

ALL OF THE ABOVE ARE ELEMENTS - Risk Management - Life Cycle Planning - Awareness and Training - Logical Access Control

Qualitative metrics are subjective in nature

TRUE

What is the difference between a Recovery Time Objective and a Recovery Point Objective

An RTO deals with the amount of time until an operation or service is made available after a disaster while an RPO deals with how current data backups are.

Match the following business continuity plans with their respective purpose or scope

BCP = Procedures for the relocation of business functions to an alternate site IRP = focus is on immediate responses to incidents affecting systems and/or networks DRP = procedures to recover from a disaster CMP = addresses human issues and communication with personnel and public

Match the following frameworks with the phrase that best describes each

COBIT = Framework for IT Governance COSO = Used by many organizations with Sarbanes-Oxley requirements ISO 17799 = Plan, Do, Check, Act SABSA = Focuses on business processes and slices organization up into process layers ISO 27001 = Considered best practices for controls and improving information security management systems

Which of the following would NOT be considered an information security related planning framework

COBOL Top Down

Tactical planning typically involves a scope of 1-5 years

TRUE

Oreck took care of its employees all throughout the Katrina devastation. They provided shelter, food and essentials and never missed a payroll. In a contingency planning context what does this fall under?

Crisis Management

Match the following BC storage options

Electronic Vaulting = Bulk batch transfer of data to off-site location Remote Journaling = Remote storage of transactions only Database Shadowing = remote storage database and transactions in real time

Which of the following would NOT be a goal of Disaster Recovery Planning?

Ensure an alternate site as adequate resources to facilitate operations

Match each security policy type with its best description

Enterprise = Links to vision and mission statements Issue-Specific = An overall policy regarding documented storage System-Specific = Managerial and technical guidance

A Business Continuity Plan focuses on recovering operations at an organization's primary site

FALSE

A Business Impact Analysis (BIA) is a policy document outlining the goals and scope of contingency efforts

FALSE

A Key Risk Indicator (KRI) is a measurement of how well something is doing.

FALSE

After Hurricane Katrina, it took Oreck Corporate over 6 months until they were able to get business functioning

FALSE

Disaster Recover Plans only focus on natural disasters, Man-Made disasters involving information systems are covered in the Incident Response Plan

FALSE

Disaster Recovery and Business Continuity are really the same thing. That is why many combine them into a Business Resumption Plan

FALSE

In the second phase of the 6-phase planning approach cycle, risks are identified and ranked.

FALSE

Information Security policies only exist to avoid litigation

FALSE

Metrics are really only useful to the CEO and top managers

FALSE

Most planning approaches have 3 basic levels: Strategic, Tactical and Disaster planning.

FALSE

Oversimplification of a security metric, for the sake of clarity, is advisable.

FALSE

Risk Management and Contingency Planning are the same process

FALSE

Strategic planning is "what are we going to do" and "how are we going to do it"

FALSE

The Oreck example shows that supplier and vendor relationships are not that important in times of disaster

FALSE

Virtualization provides less flexibility in quickly deploying services to remote sites.

FALSE

Which of the following best represents the System Development Life Cycle model order

Initiation Acquisition Implementation & Assessment Operations Disposal

Place the following SecSDLC phases in proper order

Investigation Analysis Logical Design Physical Design Implementation Maintenance

A policy describing the protection of privacy would be which type policy?

Issue-Specific Security Policy

Why is an alert roster important in incident response?

It allows the organization to alert the right people in the correct order.

Why is a business impact analysis important to contingency planning?

It provides an assessment of the impact of various attacks on operations and ability to recover from such attacks.

The goal of secSDLC is to ensure information security is addressed throughout a project's lifecycle

TRUE

Match the following planning precursor with their definitions

Mission Statement = More explicit in declaring the business of the organization and intended operations Vision Statement = articulates what the organization wants to look like Value Statement = Statement of qualities and principles matched with benchmarks

In what phase of the 6-phase planning cycle are countermeasures and controls deployed

Phase 4 - Phase 1 - Security Governance Phase 2 - Set Security Goals Phase 3 - Risk Analysis Phase 4 - Risk Reduction Phase 5 - Crisis Management Phase 6 - Assessment

Which of the following is NOT a phase of the 6-phase planning approach

Physical Site - Governance - Setting Goals - Risk Analysis - Physical Site - Risk Reduction - Assessment

Which of the following would not be a strategic level management area?

Policy compliance

Which of the following best represents the order regarding security policy formation?

Policy, standards, (practices, guidelines, procedures)

Match the DRP phases with their descriptions

Preparation = Includes rehearsal necessary to respond to a disaster Response = Includes notifying appropriate key individuals during a disaster Recovery = ensuring the collection of necessary business information and systems after a disaster Resumption = critical business functions brought back online Restoration = normal operations once again secured at the primary site

Which of the following is NOT true regarding the role of security planning?

Should be a bottom-up approach

Good metrics should be:

Specific, Measurable, Attainable, Repeatable, Time-Dependent.

A BIA is the first major phase in the business contingency cycle

TRUE

A Business Continuity Plan ensures that critical business functions can continue in the case of a disaster

TRUE

A Business Impact Analysis assumes all existing controls have been bypassed and a disruption was successful

TRUE

A Key Performance Indicator (KPI) is a measure of how well something is being done.

TRUE

Balanced scorecards are used to show progress of strategy

TRUE

Business Resumption focuses on the remaining unrestored functions of an organization after disaster

TRUE

Contingency Planning's goal is to restore normal modes of operation after unexpected events

TRUE

Crisis management is a series of focused steps that deal with the safety and state of employees and their families during and after a disaster.

TRUE

Full interruption testing of business continuity plans are not frequently (if at all) done by most organizations because they are expensive and disruptive to operations

TRUE

If a disaster is bad enough, a business continuity plan could be executed prior to or concurrent with a Disaster Recovery Plan

TRUE

If countermeasures are adequate to stop an attack, then the attack does not become an incident.

TRUE

In the 6-phase planning approach, governance oversees, review and approves policies while management establishes, ensures and assess them.

TRUE

In the Crisis Management phase of the 6-phase approach, protocols are established to assess and limit damage.

TRUE

Incident response is a reactive measure, not a preventive measure

TRUE

Incident response planning uses the BIA to focus in on what countermeasures, if any, exist and if they are adequate to mitigate an end-case scenario threat.

TRUE

Metrics enable an understanding of security controls and allow an organization to focus limited resources on that which needs fixing most.

TRUE

Why did Oreck's disaster recovery plan faile?

The disaster recovery site was too close and was also rendered unusable

If a countermeasure did not stop an attack and the security incident response team cannot contain the attack, what generally is the next step if the impact of the attack greatly affects the organization?

The incident is quickly escalated to the disaster recovery team in an effort to restore normal functions.


Set pelajaran terkait

Prep U Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set

Ch.1 Com. Sci. understanding Part 2

View Set

Chapter 45 - Anticoagulants, Antiplatelets, and Thrombolytics

View Set