Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
disaster recovery planning
|
the preparation for and recovery from a disaster, whether natural or man-made.
|
|
acts of terrorism
|
cyber terrorism or activism
|
|
rapid onset disasters
|
occur suddenly with little warning, taking the lives of people and destroying the means of production (i.e. earthquakes, floods, storms, tornadoes, or mud flows).
|
|
slow onset disasters
|
occur over time and slowly deteriorate the capacity of an organization to withstand their efforts (i.e. droughts, famine, environmental degradation, deforestation, and pest infestation).
|
|
Earthquake
|
Can cause direct damage to all or part of the information system or, more often to the building that houses it. May disrupt operations by interrupting access infrastructure. Can be mitigated with a specificseparate insr. policy.
|
|
electrostatic disharge (ESD)
|
Can be costly or dangerous if it ignites flammable mixtures and costly components. Can cost loss of production time. Not really viewed as a threat. But, can be covered by a business interruption plan.
|
|
disaster recovery program
|
provides direction and guidance of any and all disaster recovery operations and the development and support for the disaster recovery plan
|
|
trigger
|
a point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT. Most come as a response to a one or another natural event.
|
|
actions after phase
|
lost or damaged data is restored, systems scrubbed of infection, and essentially everything is restored to its previous state.
|
|
follow-on incidents
|
Are highly probably probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.
|
|
forensics analysis
|
the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.
|
|
after-action review
|
a detailed examination of events that occurred from first detection to final recovery. All team members review their actions during the incident and identify areas where the IR plan worked, didn't work, or should improve.
|
|
servers
|
support file sharing and storage, data processing, central application hosting (such as e-mail or a central database), printing, access control, user authentication, remote access connectivity, and other shared network services.
|
|
website contingency solutions
|
should ensure the reliability and availability of the website and its resources. The website's infrastructure must be considered carefully.
|
|
local area network
|
is owned by a single organization. It can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.
|
|
contingency strategies
|
should emphasize the mainframe's data storage capabilities and underlying architecture.
|
|
redundant system components
|
Are critical to ensure that a failure of a system component such as a power supply, does not cause a system failure.
|
|
mitigation of impact
|
the inclusion of action steps to minimize the disaster-associated damage on the operations of the organization.
|
|
crisis management
|
a set of focused steps that deal primarily with the safety and state of the people from the organization who are involved in the disaster.
|
|
degraded mode
|
operations under adverse conditions or less-than-ideal circumstances such as loss of power or lighting, loss of communications (phone or network), and so on.
|
|
communication team
|
trains by preparing information notices, news releases, and internal memorandums and directives to provide information to all groups and teams as to what their current tasks and responsibilities are.
|
|
network recovery team
|
The team responsible for reestablishing connectivity between systems and to the Internet (if applicable). May be used to replacing downed systems.
|
|
storage recovery team
|
the team responsible for the recovery of information and the reestablishment of operations in storage area networks or network attached storage.
|
|
applications recovery team
|
the team responsible for recovering and reestablishing operations of critical business applications.
|
|
data management team
|
the team primarily responsible for data restoration and recovery. Their training correspondingly focuses on quick and accurate restoration of data from backup.
|
|
business interface team
|
the team responsible for working with the remainder of the organization to assist in the recovery of non technology functions.
|
|
logistics team
|
the team responsible or providing any needed supplies, space, materials, food, services, or facilities needed at the primary site-other than vendor-acquired technology and other material obtained by the vendor team.
|
|
internal testing
|
can include employees conditioning self-assessments after an exercise by completing feedback surveys indicating what they thought worked well and what didn't.
|
|
external testing
|
can come from standardization groups, or consultants, certification or accreditation groups, or a group selected by the organization's management from a sister company.
|
|
DR plan desk check
|
involves providing copies of the DR plan to all teams and team members for review.
|
|
DR plan structured walk-through
|
all involves individuals walk through the steps they would take through an actual disaster, either on site or as a conference room discussion.
|
|
DR plan parallel testing
|
Individuals or teams act s if and actual disaster occurred, performing their required tasks and executing the necessary procedures, without interfering with the normal operations of the business.
|
|
DR plan full-interruption
|
The individuals follow each and every procedure, including the interruption of service, restoration of data backups, and notification of appropriate individuals.
|
|
DR plan war gaming
|
state and federal-mandated emergency readiness to prepare for terrorist strikes. Not very many venues for this practice. There is little work in this area.
|
|
DR plan alert roster
|
must have a mechanism to contact everyone in the organization, especially if part of the message is "don't report to work today, but call this # for more info."
|
|
reponse phase
|
the phase associated with implementing the reaction to a disaster facing the organization and is focused on those actions designed to control or stabilize the situation, if that is possible. Involver activating the DR plan and following the steps outlined therein.
|
|
recovery phase
|
the phase where the organization begins the recovery of the most time-critical business functions-those necessary to reestablish business operations and prevent further economic and image loss to the organization.
|
|
resumption phase
|
focuses on the functions that are not critical.
|
|
restoration phase
|
Considered the final phase of the disaster recovery plan implementation, the organization conducts the operations necessary to rebuild the facilities and reestablish operations at "home base."
|
|
standing down
|
represents the deactivation of the disaster recovery teams, releasing individuals back to their normal duties.
|