Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

Incident Response – Eradication Phase The process of removing the results of the incident. Eradication also involves determining how the incident occurred and implementing corrective controls to ensure that it cannot re-occur. Incident Response – Recovery Phase The process of restoring the affected information system back to production. Recovery involves the testing of operations as well as period of heightened monitoring to ensure all negative results of the incident have been caught and corrected. Security Incident Any occurrence that actually, or potentially, jeopardizes the confidentiality, integrity and/or availability of an information system and/or the information that it houses. Further, any occurrence that contravenes or otherwise constitutes a violation of the established security policies, standards, baselines, guidelines and/or procedures. Risk Assessment The process of identifying the risks to operations, assets, or individuals arising through the operation of an information system. Privacy Assessment The process of identifying how information is handled to ensure that the handling conforms with existing regulation, to determine the risks of collecting, storing and disseminating identifiable information in an information system, and to evaluate protection mechanisms and processes to mitigate that risk. Security Assessment The process of determining the extent to which changes to an information system have affected the security stance of that system. Vulnerability Assessment The process of determining the presence of system vulnerabilities that could be used as a launch point for exploits to breach the information system. Personally Identifiable Information (PII) Information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual. Examples of PII include, but are not limited to, name, address, phone number and/or e-mail address, especially when in connection to or combination with an individual’s Social Security Number (SSN). 52

State of Kansas Mandatory Procedures Documentation State of Kansas January 11, 2010

Incident Response – Eradication Phase<br />

The process <strong>of</strong> removing the results <strong>of</strong> the incident. Eradication also involves<br />

determining how the incident occurred and implementing corrective controls to ensure<br />

that it cannot re-occur.<br />

Incident Response – Recovery Phase<br />

The process <strong>of</strong> restoring the affected information system back to production. Recovery<br />

involves the testing <strong>of</strong> operations as well as period <strong>of</strong> heightened monitoring to ensure<br />

all negative results <strong>of</strong> the incident have been caught and corrected.<br />

Security Incident<br />

Any occurrence that actually, or potentially, jeopardizes the confidentiality, integrity<br />

and/or availability <strong>of</strong> an information system and/or the information that it houses.<br />

Further, any occurrence that contravenes or otherwise constitutes a violation <strong>of</strong> the<br />

established security policies, standards, baselines, guidelines and/or procedures.<br />

Risk Assessment<br />

The process <strong>of</strong> identifying the risks to operations, assets, or individuals arising through<br />

the operation <strong>of</strong> an information system.<br />

Privacy Assessment<br />

The process <strong>of</strong> identifying how information is handled to ensure that the handling<br />

conforms with existing regulation, to determine the risks <strong>of</strong> collecting, storing and<br />

disseminating identifiable information in an information system, and to evaluate<br />

protection mechanisms and processes to mitigate that risk.<br />

Security Assessment<br />

The process <strong>of</strong> determining the extent to which changes to an information system have<br />

affected the security stance <strong>of</strong> that system.<br />

Vulnerability Assessment<br />

The process <strong>of</strong> determining the presence <strong>of</strong> system vulnerabilities that could be used as<br />

a launch point for exploits to breach the information system.<br />

Personally Identifiable Information (PII)<br />

Information that can be used to uniquely identify, contact, or locate a single person or<br />

can be used with other sources to uniquely identify a single individual. Examples <strong>of</strong> PII<br />

include, but are not limited to, name, address, phone number and/or e-mail address,<br />

especially when in connection to or combination with an individual’s Social Security<br />

Number (SSN).<br />

52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!