Sie sind auf Seite 1von 5

CYBER SECURITY AND RISK ASSESSMENT 1

Cyber security and risk assessment


CYBER SECURITY AND RISK ASSESSMENT 2

Question 1

Incident Response

According to my knowledge and understand incident response in terms of cyber security or data

management is the process or a model that cyber security field professional or a group of professional

follow to clearly communicate any internal or external risk found in organizational structure. Most

commonly in companies and businesses all over the world Cyber security analyst are the one’s who are

responsible for incident responding and communication risks levels their priority and also suggest

feasible solutions to the workplace and employees of the company or organization.

Question 2

Discussing some Indicators of an incident or cyber breach

We can classify an incident into two sections one a cyber-security attack or second a security breach or

a full compromise of organizational systems. Below are the most common indicators of an attack or a

compromise on organizational data or assets:

 Unauthorized financial transactions

 Unusual web traffic usage

 Allocation of high privileges of organizational systems to unknown users

 Unusual activities or missing information from databases

 Organizational systems not working properly

 Organizational systems are not accessible for employees


CYBER SECURITY AND RISK ASSESSMENT 3

Question 3

Site resumption strategies

Site Cost Hardware/Equipment Telecomm Set-Up Location


Time

Cold Site Low Full Partial Low Long

Warm Site Medium High High


Medium/ Medium/Hig
High h

Hot Site High High High Long Long

Mobile Site High Medium/High High Not Fixed


Medium/
High

Mirrored Full Short Dependent


Site Dependent Medium/High
CYBER SECURITY AND RISK ASSESSMENT 4

Question 4

The terms between Disaster Recovery Plan and Business Continuity Plan can sound similar

but in reality they are completely different terms and serves completely different purposes.

But these both plans are crucial and one plan cannot work without another because if a

company implement one plan it can only provide partial security and benefits. Disaster

recovery plans are created and used in emergency situations in which some type of disaster

has happened that have damaged the assets of the organization. And disaster recovery plan

helps the company to rebuild and restore the damaged assets a disaster can be of any type a

natural disaster like storms, earthquake and flood etc. and internal disaster include fire, loss of

data by accident or hardware damage and external disaster include cyber-attacks and security

breaches. Business Continuity Plans make sure that in an event of a disaster regardless of

what type of disaster it is, the organizational services, systems and products must continue to

be offered without any down time. If an organization do not have a disaster recovery plan, it

will be very hard for a company to control and rebuild the assets in an event of disaster. And

if a company do not have a business continuity plan in an event of emergency or attack the

company can suffer a great deal of loss due to downtime.


CYBER SECURITY AND RISK ASSESSMENT 5

References

BOJANA DOBRAN. (2018). Business Continuity vs. Disaster Recovery: You Need To

Know The Difference? Retrieved from PhoenixNAP Global IT Services website:

https://phoenixnap.com/blog/business-continuity-vs-disaster-recovery

Chickowski, E. (2013, October 9). Top 15 Indicators Of Compromise. Retrieved December 6,

2019, from Dark Reading website: https://www.darkreading.com/attacks-breaches/top-15-

indicators-of-compromise/d/d-id/1140647

Crowdstrike. (2015, May 30). List of Indicators of Attacks Vs Indicators of Compromise.

Retrieved December 6, 2019, from Crowdstrike.com website:

https://www.crowdstrike.com/resources/white-papers/indicators-attack-vs-indicators-

compromise/

DeCianno, J. (2014, December 9). IOC Security: Indicators of Attack vs. Indicators of

Compromise. Retrieved December 6, 2019, from Crowdstrike.com website:

https://www.crowdstrike.com/blog/indicators-attack-vs-indicators-compromise/

DISYS. (2014). The difference between disaster recovery and business continuity - and why

IT matters for both. Retrieved December 6, 2019, from DISYS website:

https://www.disys.com/news/the-difference-between-disaster-recovery-and-business-

continuity-and-why-it-matters-for-both/

Das könnte Ihnen auch gefallen