Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

Incident Response – Eradication Phase The process of removing the results of the incident. Eradication also involves determining how the incident occurred and implementing corrective controls to ensure that it cannot re-occur. Incident Response – Recovery Phase The process of restoring the affected information system back to production. Recovery involves the testing of operations as well as period of heightened monitoring to ensure all negative results of the incident have been caught and corrected. Security Incident Any occurrence that actually, or potentially, jeopardizes the confidentiality, integrity and/or availability of an information system and/or the information that it houses. Further, any occurrence that contravenes or otherwise constitutes a violation of the established security policies, standards, baselines, guidelines and/or procedures. Risk Assessment The process of identifying the risks to operations, assets, or individuals arising through the operation of an information system. Privacy Assessment The process of identifying how information is handled to ensure that the handling conforms with existing regulation, to determine the risks of collecting, storing and disseminating identifiable information in an information system, and to evaluate protection mechanisms and processes to mitigate that risk. Security Assessment The process of determining the extent to which changes to an information system have affected the security stance of that system. Vulnerability Assessment The process of determining the presence of system vulnerabilities that could be used as a launch point for exploits to breach the information system. Personally Identifiable Information (PII) Information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual. Examples of PII include, but are not limited to, name, address, phone number and/or e-mail address, especially when in connection to or combination with an individual’s Social Security Number (SSN). 52

State of Kansas Mandatory Procedures Documentation State of Kansas January 11, 2010

State <strong>of</strong> Kansas<br />

Mandatory Procedures Documentation<br />

State <strong>of</strong> Kansas<br />

January 11, 2010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!