Frage | Antworten |
Computer Security Incident | An event that negatively impact to confidentiality, integrity and availability of Information that is processed, stored or transmitted using computer. |
Computer Security | A preservation of confidentiality, integrity and availability of information that is processed, stored or transmitted using a computer. |
Computer Security Categories | Prevention:Detection:Respond:Recovery |
Computer Security Incident Response | Act performed in response to computer security incident |
CSIRT | CSIRT is a prearranged group comprised of personnel with expert of various facets within an organization, preparet to deal with the response activities related to computer security incident for a defined constituency |
Overall Goal of CSIRT | Maintain security service triad of confidentiality, integrity and availability of electronic information and information technology assets in response to computer security incidents. |
Incident Containment Purpose | The purpose of containing the incident is simply to limit extent of the attack |
Incident Recovery Order | 1. Critical Systems 2. Non-Critical High Demand System 3. All other remaining systems |
Incident Response | Incident response is a process of responding to incidents that may have occurred due to security breach in the system or network |
Incident Reporting | Incident reporting is the process of reporting an encountered security breach in a proper format |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.