Please enable JavaScript.
Coggle requires JavaScript to display documents.
Domain 5 - Risk management (5.2 - Business Impact Analysis concepts…
Domain 5 - Risk management
5.1 - Importance of policies, plans and procedures related to organizational security
Personnel Management
Exit interviews
Role-based awareness training
Executive user
NDA
Privileged user
Onboarding
User
Continuing education
System owner
Acceptable use policy/rules of behavior
System administrator
Adverse actions
Data owner
Background checks
Clean desk
Separation of duties
Job rotation
Mandatory vacations
General security policies
Social media networks / apps
Personal email
Agreement types
SLA
ISA
BPA
MOU/MOA
Standard operating procedure
5.4 - follow incident response procedures
Incident response plan
Reporting requirements/escalation
Cyber-incident response teams
Roles and responsibilities
Exercise
Documented incident types/category definitions
Incident response process
Containment
Eradication
Identification
Recovery
Preperation
Lessons learned
5.3 - Risk Management processes and concepts
Threat assessment
Manmade
Internal vs. external
Environmental
Risk assessment
Quantitative
Qualitative
Impact
Testing
Penetration testing authorization
Vulnerability testing authorization
Supply Chain assessment
Likelihood of occurrence
Risk register
Risk response techniques
Transfer
Avoid
Accept
Mitigate
Asset value
ARO
ALE
Change management
SLE
5.2 - Business Impact Analysis concepts
Single point of failure
Impact
Safety
Finance
Property
Reputation
Life
Identification of critical systems
Privacy impact assessment
Mission-essential functions
Privacy threshold assessment
MTTR
MTBF
RTO/RPO
5.7 - Compare and contrast various types of controls
Corrective
Compensating
Detective
Technical
Preventative
Administrative
Deterrent
Physical
5.6 - disaster recovery and continuity of operation concepts
Backup concepts
Incremental
Snapshots
Differential
Full
Order of restoration
Geographic Considerations
Location selection
Legal implications
Distance
Data sovereignty
Off-site backups
Recovery sites
Warm site
Cold site
Hot site
Continuity of operation planning
Failover
Alternate processing sites
After-action reports
Alternate business practices
Exercises/tabletop
5.5 - Basic concepts of forensics
Data acquisition
Record time offset
Take hashes
Capture video
Screenshots
Network traffic and logs
Witness interviews
Capture system image
Preservation
Legal hold
Recovery
Chain of custody
Strategic intelligence/counterintelligence gathering
Active logging
Order of volatility
Track man-hours
5.8 - Carry out data security and privacy practices
Data sensitivity labeling and handling
Public
Proprietary
Private
PII
Confidential
PHI
Data destruction and media sanitization
Pulverizing
Degaussing
Pulping
Purging
Shredding
Wiping
Burning
Data roles
Steward/custodian
Privacy officer
Owner
Data retention
Legal and compliance