click below
click below
Normal Size Small Size show me how
Chapter 13-Security
| Term | Definition |
|---|---|
| business continuity | the ability of an organization to maintain operations and services in the face of a disruptive event. |
| Business continuity planning and testing | the process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient. |
| business impact analysis (BIA) | An analysis that identifies mission-critical business functions and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position. |
| chain of custody | A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence. |
| clustering | Combining two or more servers to appear as one single unit. |
| cold site | A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations. |
| computer forensics | Using technology to search for computer evidence of a crime. |
| disaster recovery plan (DRP) | A written document that details the process for restoring IT resources following an event that causes a significant disruption in service. |
| data backup | The process of coyping information to a different medium and storing it (preferably at an offsite location) so that it can be used in the event of a disaster. |
| Faraday cage | A metallic enclosure that prevents the entry or escape of an electromagnetic field. |
| forensics (forensic science) | The application of science to questions that are of interest to the legal profession. |
| heating, ventilation, and air conditioning (HVAC) | Systems that provide and regulate heating and cooling. |
| high availability | A system that can function for an extended period of time with little downtime. |
| hot aisle/cold aisle | A layout in a data center that can be used to reduce heat by managing air flow. |
| hot site | A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link. |
| IT contingency planning | The process of developing an outline of procedures to be followed in the event of a major IT incident or an incident that directly impacts IT. |
| mean time between failures (MTBF) | A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced. |
| order of volatility | The sequence of volatile data that must be preserved in a computer forensic investigation. |
| RAID (Redundant Array of Independent Drives) | A technology that uses multiple hard disk drives for increased reliability and performance. |
| recovery point objective (RPO) | The maximum length of time that an organization can tolerate between backups. |
| recovery time objective (RTO) | The length of time it will take to recover data that has been backed up. |
| risk assessment | The process of identifying threats. |
| single point of failure | A component or entity in a system which, if it no longer functions, would adversely affect the entire system. |
| succession planning | Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees. |
| system image | A snapshot of the current state of the computer that contains all settings and data. |
| tabletop exercises | Exercises that simulate an emergency situation but in an informal and stress-free environment. |
| warm site | A remote site that contains computer equipment but does not have active Internet or telecommunication facilities, and does not have backups of data. |
| mean time to recovery (MTTR) | The average time for a device to recover from a failure that is not a terminal failure. |