U
NIT
11:
C
YBER
S
ECURITY AND
I
NCIDENT
M
ANAGEMENT
Pearson BTEC International Level 3 Qualifications in Information Technology –
Specification – Issue 3 – September 2022 © Pearson Education Limited 2022
161
•
The purpose and content of an incident response policy and associated
procedures:
o
assembling the Computer Security Incident Response Team (CSIRT), roles in the
team, including team leader, incident lead, associate members
o
incident reporting procedures, including what constitutes a security
incident,
and how to report it and to whom
o
initial assessment of the incident, including identifying if this is a real incident,
the type of attack and its severity
o
communicating the incident to the CSIRT and other relevant individuals
o
containing the damage and minimising the risk
o
protect people’s safety
o
protect sensitive data and other data, protecting the most valuable first
o
protect hardware and software
o
minimise disruption to computing resources
o
identifying the type and severity of the compromise, including the nature of the
attack, its intent, its origin and the systems and files that have been
compromised
o
protecting evidence and creating backups for evidence and data recovery,
including the removal and storage of original
hard disks
o
notifying external agencies, if appropriate, and discussing options with legal
representatives, contact external agencies such as law enforcement, external
security and virus experts
o
recovery of systems and identification of the point in time when the
compromise occurred and restore backups from before that point in time
o
compile and organise incident
documentation, including documentation
created by the CSIRT identifying the details of the breach and actions taken
o
know the importance of preserving and collating documentation that may be
needed to prosecute offenders
o
review outcomes to update policies and improve training.
•
Topics typically covered in a disaster recovery plan and their purpose:
o
identification of critical systems, definitions of recovery time objective (RTO) and
recovery point objective (RPO)
o
prevention, response and recovery strategies for critical systems, including
–
people responsible
–
facilities and equipment required
–
data backup
location and format
–
network connectivity and bandwidth
–
suppliers of equipment and people
o
definition of recovery procedures for each critical system
o
disaster recovery plan structure following ISO 27031/24762 or other relevant
international equivalents, including
–
introduction
–
roles and responsibilities
–
incident response procedures
–
activating the disaster recovery plan
–
procedures to be followed.
U
NIT
11:
C
YBER
S
ECURITY AND
I
NCIDENT
M
ANAGEMENT
Pearson BTEC International Level 3 Qualifications in Information Technology –
Specification – Issue 3 – September 2022 © Pearson Education Limited 2022
162
Dostları ilə paylaş: