Chapter 2 - ISC2 | PDF | Computer Security | Security
0% found this document useful (0 votes)
33 views2 pages

Chapter 2 - ISC2

The document discusses incident response and business continuity planning. It defines key incident response terminology and outlines the components and goals of an incident response plan. It also explains the importance of business continuity planning and lists the typical components of a business continuity plan such as immediate response procedures, notification systems, and contact information for critical supply chain members.

Uploaded by

Jamaal Jackson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
33 views2 pages

Chapter 2 - ISC2

The document discusses incident response and business continuity planning. It defines key incident response terminology and outlines the components and goals of an incident response plan. It also explains the importance of business continuity planning and lists the typical components of a business continuity plan such as immediate response procedures, notification systems, and contact information for critical supply chain members.

Uploaded by

Jamaal Jackson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 2

➢ Therefore, strict adherence to this Code is a condition of certification.

❖ Canons
➢ Protect society, the common good, necessary public trust and confidence,
and the infrastructure.
➢ Act honorably, honestly, justly, responsibly and legally.
➢ Provide diligent and competent service to principals.
➢ Advance and protect the profession.

Official Notes:

https://learn.isc2.org/content/enforced/9541-CC-SPT-GLOBAL-1ED-1M/build/chapter
_01/assets/EDU-CC-70175-ch01_Takeaway.pdf?ou=9541

Chapter 2:

Incident Response

❖ Incident Terminology
➢ Breach: Loss of control compromise or unauthorized use
➢ Event: Any occurance
➢ Exploit: Attack that exploits vulnerability
➢ Incident: Event that jeopardizes information or system
➢ Intrusion: Security event where system has been breached
➢ Threat: Anything that could impact the operations of the system and its
use
➢ Vulnerability: Weakness in the system or security
➢ Zero Day: A vulnerability that that does ot get detected due to
unrecognized pattern or methods
❖ Goal of Incident Response:
➢ Protect life, health and safety
➢ Adverse Event: Events with negative consequences for the system and its
use
➢ Incident Response Plan: Predetermined procedures to assess and combat
adverse events
➢ Business Continuity Management (BCM)
❖ Components of Incident Response Plan:
➢ Preparation
➢ Detection and Analysis
➢ Containment, Eradication and Recovery
➢ Post Incident Activity
❖ Incident Response Team
➢ Security Operations Center (SOC): Tema that monitors system for
disruptions or intrusions
➢ Computer Incident Response Teams (CIRT)
■ Determine scope of damage
■ Determine confidential information compromised
■ Implement recovery measures
■ Supervise implementation of added security measures to improve
security

Business Continuity (BC)

❖ Importance of BC:
➢ sustain business operations while recovering from a significant disruption
➢ A key part of the plan is communication, including multiple contact
methodologies and backup numbers in case of a disruption of power or
communications.
❖ Components of BC Plan:
➢ Proactive development of procedures to restore business operations after a
disaster or other significant disruption to the organization
■ List of the BCP team members, including multiple contact methods
and backup members
■ Immediate response procedures and checklists (security and safety
procedures, fire suppression procedures, notification of appropriate
emergency-response agencies, etc.)
■ Notification systems and call trees for alerting personnel that the
BCP is being enacted
■ Guidance for management, including designation of authority for
specific managers
■ How/when to enact the plan
■ Contact numbers for critical members of the supply chain
(vendors, customers, possible external emergency providers,
third-party partners)

Disaster Recovery

❖ Goal of DR: actions of emergency response personnel until business is restored to


full last-known reliable operations.
❖ DR Plan
➢ Executive summary providing a high-level overview of the plan

You might also like