According to NIST Special Publication 800-34 Rev.1, what are the three distinct phases an organization goes through when reacting to an event that is determined to pose a threat to the organization?

What will be an ideal response?

According to NIST Special Publication 800-34 Rev.1, an organization goes through three distinct phases when reacting to an event that is determined to pose a threat to the organization:
·      The Activation/Notification Phase describes the process of activating the plan based on outage impacts and notifying recovery personnel.
·      The Recovery Phase details a suggested course of action for recovery teams to restore system operations at an alternate site or using contingency capabilities.
·      The Reconstitution Phase includes activities to test and validate system capability and functionality and outlines actions that can be taken to return the system to normal operating conditions and prepare the system against future outages.

Computer Science & Information Technology

You might also like to view...

One reason for not using a header node in the LinkedList class is because:

A. it makes the code more complex B. it would significantly slow down all list operations C. the header node would interfere with the array element position in the hash table D. the header node would waste more memory for an empty linked list in a hash table

Computer Science & Information Technology

Which of the following refers to the process of attempting to attract intruders to a subsystem that is set up to monitor them?

A) Threshold monitoring B) Intrusion deterrence C) Resource profiling D) Intrusion deflection

Computer Science & Information Technology