Please enable JavaScript.
Coggle requires JavaScript to display documents.
The Five Nines Concept - Coggle Diagram
The Five Nines Concept
-
-
Incident Response
Response Phases
Detection and Analysis
-
Orgs can have the best detection systems: however, if admins do not review the logs and monitor alerts its useless
-
Incident analysis helps to identify the source, extent, impact, and details of a data breach
Containment and Eradication, and Recovery
-
-
Preparation
-
Orgs should have a response plan and a Computer Security Inicdent Response Team (CSIRT) to manage the response
-
Post-Incident Follow-Up
Investigate the cause of the incident and ask questions to better understand the nature of the threat
Questions include
-
-
How can it minimize downtime during the containment, eradication, and recovery phases?
-
-
Response Technologies
NetFlow and IPFIX
Netflow is a Cisco IOS technology that provides statistic on packets flowing through a Cisco router or multilayer switch.
The Internet Engineering Task Force (IETF) used Cisco's NetFlow Version 9 as the basis for IP Flow Information Export (IPFIX)
-
-
-
-
-
-
High Availability
The Five Nines
Five Nines mean that systems and services are available 99.999% of the time.
also means both planned and unplanned downtime is less than 5.26 minutes per year
High Availability refers to a system or component that is continuously operational for a given length of time.
-
-
Threats to Availability
There are many different types of threats to high availability, the threats can range from failure of a mission-critical application to severe storm such as a hurricane or tornado.
Threats can also include catastrophic event such
as a terrorist attack, building bombing, or building fires.
-
-