Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:01
Welcome to Cyber Aires. Video Siris on the copy of Security Plus 5 +01 Certification and example.
00:08
I'm your instructor, Ron Warner.
00:10
Please visit Cyber Ari Got I t. To learn more about security, plus the certification as well as many other certifications.
00:19
This video will help you prepare for Section five dot to summarize business impact and now says concepts
00:27
in the next few minutes explain what business impact analysis is and how they're used within all types of businesses.
00:36
Section 5.2
00:39
of the risk management domain or domain five covers the following concepts associated with a business impact analysis.
00:47
What is a business impact?
00:49
What our mission. Essential functions, identification of critical systems,
00:55
Single point of failure,
00:57
Rto and R P o Recovery time Objective Recovery point objective
01:02
and T B F. Being time between failure and M t tr. Meantime, to recovery,
01:07
privacy impact assessment and privacy threshold assessment. Stay tuned to learn more about each topic.
01:17
Business impact analysis is the process of evaluating all of the critical systems
01:23
basically important to core business functions
01:26
in an organization to defined impact and recovery plans.
01:30
Be a isn't concerned with external threats or vulnerabilities
01:34
the analysis solely focuses on the impact a loss would have on the organization.
01:41
It's that impact part of a risk assessment, which we'll talk about in the future session.
01:46
Conducting a business impact analysis involves identifying critical business functions and the service's and technologies required for each,
01:53
along with determining the cost associated with loss of each and the maximum acceptable outage period,
02:01
you can find more by reading through the nous definition. Highly recommend spending a lot of time honest as your belt, developing your security skills and you're preparing yourself as a security plus professional
02:15
critical functions. Are those mission essential functions Rolls Service's system's applications or data required to sustain the business?
02:27
What is it that your organization must have to do business? What are the system?
02:32
Were people or data
02:35
focusing on those as your top risks?
02:39
The steps for conducting a critical function analysis, which is a part of a B I A.
02:45
Is the identification and analysis so identification
02:49
of assets, systems, data, et cetera,
02:53
analyzing
02:54
prioritizing prioritization is step two. How do we determine which one should be recovered when we talk about disaster recovery? Cover this in more detail,
03:04
calculating the time frame for a critical system loss. How long can you be down?
03:09
Seconds. Milliseconds? That's the case. It, such as with Amazon or minutes. Our where a day can't depend on the business in the function
03:21
estimating the tangible and intangible impact on the business. So not only how much money will cost our time it will take.
03:30
But are there intangible, such as company's reputation with the public?
03:35
These are steps learned to do these not only for the security plus example, but also to be a good security professional.
03:43
A single point of failure is what you probably think of. It is.
03:46
It's that one falter man Mellie malfunction can compromise the whole business, an entire system or the enterprise. It's say you have one network router to get out to the Internet.
04:00
Well, if that rotor goes down, how you're gonna employees going to access Internet Resource is
04:06
that's a single point of failure. Example
04:10
that could be a person
04:12
or technology. So you have a person who handles a specific duty. They're the only one in the company who does, say, patching.
04:19
What happens if a patch is released while that person's unavailable say on vacation.
04:26
How do you avoid a single point of failure once identified
04:30
well through redundancy? So system redundancy, personnel redundancy. So you might just have multiple avenues to the Internet, for example, for redundancy or fault hollering protocols, procedures or technologies.
04:46
Great example, you often see, is high availability.
04:50
Take a look and think about in your environment where you're single point of failure may reside.
04:58
They're certain recovery objectives that you need to consider
05:02
this again is tied to that disaster recovery, which we'll talk about in a later session.
05:08
But keep this in mind when you're looking at your business impact assessment,
05:13
because this will also help determine those critical systems and functions. And service is
05:18
1st 1 I want to talk about it's R T o
05:21
re tough recovery time objective.
05:25
This is the maximum amount of time that process or service is allowed to be down,
05:30
and the consequence is still to be considered acceptable. For how long
05:34
can your email be down? Or a particular application?
05:40
So your recovery time objective,
05:44
huh,
05:45
is how quickly you want to be able to recover again. Cover this later in the business
05:51
recovery session. Disaster recovery, business continuity session.
05:57
Our P o recovery point objective recovery point objective is the point last known good data prior to an outage. So what point you're going to recover?
06:08
Can you afford to go back in time, say, two hours
06:12
where it has to be two minutes? You know, how much are you willing to lose?
06:15
So example Hammond's on
06:16
multiple transaction transactions every millisecond, so pretty much everything is mirrored for that. But maybe your organization can go back one day and not lose critical data.
06:29
That will be your recovery point objective.
06:31
As a general rule, the closer the R P o recovery point objective matches the time of the crash.
06:39
The more expensive it is to obtain, for example, mirroring very expensive, as opposed to daily backups not nearly as expensive.
06:47
Good point to remember for the exam.
06:50
Maur acronyms associated with a business impact assessment are empty. B f and M t t f.
06:59
Meantime, to failure.
07:00
This is the average time to fell for failure for not repairable system,
07:06
so
07:06
health. So how often will the system be anticipated to fail? For example, laptops, you know, have a limited life span,
07:15
so you can almost assume that eventually a laptop will die. But this isn't mean or average time for that failure.
07:24
It represents how long a product could reasonably be expected to perform
07:28
beast on specific testing. So it's good to know
07:31
when you're not only purchasing a particular device the M T T F,
07:38
but also
07:40
within that life span of the device. How soon until you can anticipate it to fail.
07:46
Meantime, between failures is the measure of the anticipated incidents of failure to a system or component. This means is the measurement determined the components anticipated. Lifetime.
07:57
Make sure you don't get thes two terms confused. It's pretty easy to
08:01
review the study material that's available through this course and others. Make sure you get thes two terms down because there's a possibility you may see this on the security. Plus example,
08:15
another important concept associated with this is meantime to recovery
08:20
or restore were repair. I've seen MT. T R to me both recovery, restore or repair.
08:26
I'm sure you're familiar with all of those.
08:28
So how long will it take for you to recover that system? What's that average time? So my laptop goes down. How fast could I recover my lost data.
08:39
How can I restore business? How long will it take in that time period?
08:45
So it's average time to repair a failed system, the vice or component
08:50
in return it back to operational status. That's the key. It's not just repairing.
08:54
Getting back into business is so key.
08:58
The calculations includes the preparation time,
09:01
active meeting, it's time
09:03
and any delays. So police anticipate there's always going to be a delay,
09:07
and this is often part of a maintenance contract. If you remember from the previous video 51 I talked about an S L A M T tr could easily be part of an S L A agreement service level agreement.
09:22
Uh,
09:22
how long will you anticipate your service provider to be able to recover the service for you?
09:28
Get something we see in business quite often.
09:33
The last session
09:35
in section 5.2 is focused on privacy. Granted will be covering privacy in more detail in Section five, Diet eight, which plucks about privacy best practices.
09:46
It's part of a business impact assessment, though you might have to do a privacy impact assessment, or P. I. A
09:54
Pia is important component of the General data protection regulations, which is in the European Union. A p I. A privacy impact assessment goes with a b i business impact assessment
10:09
As you're conducting your P I A. You need to understand and identify first what is personally identifiable information. P I
10:18
on the screen is the miss definition in general. It's your name associate with some other type of identify. Can you be quickly and easily identified?
10:30
Generally, what P. I I is
10:33
another common privacy terms. P h I Personal health information were protected health information. This is information about your medical status or health care.
10:46
When you're conducting a P I a privacy impact assessment,
10:50
you're looking at
10:52
adverse impacts If there's a privacy breach, so it's normally the confidentiality of personal information is inadvertently disclosed to be on accident or malicious activity
11:05
could be associated with the destruction, loss, corruption or, as I mentioned, the accidental disclosure of sensitive personal or private data
11:15
that your organization holds on the behalf of your clients or customers.
11:20
What you need to do. This is all part of a data investigation. Where is that data reside? How would it be disclosed? So it takes a lot of due diligence to identify and then classify. We'll talk about data classifications later in a different session.
11:37
Understand the details. Associate with a P I A. Because you will be seeing it in your career.
11:43
Also with the P I A. It's required for any organization that stores collects processes. Personal health information as part of HIPPA in the United States i. H. I. P. A. A Health insurance portability
11:58
act there. We have a privacy
12:01
rules associated with it where you need to conduct a P I A.
12:05
One other last term associated with privacy assessment is the privacy threshold assessment
12:13
You were actually assessing. What systems hold p I. I were P h I.
12:18
What is that threshold that can contain? How do you protect that private information?
12:24
Be aware of these privacy terms. Privacy has gotten to be a big deal, and we'll see it
12:30
in your lifetime. Maybe also on the security Plus example.
12:35
At this point, let's look at a question you may see on a typical security plus example
12:45
for this section on business impact assessments. Let's see you answer this one in the context of a B I A.
12:52
This term represents how long a product could be reasonably expected to perform based on specific testing.
13:01
Is it a recovery time objective? B and T, T, F, C, M, T, T, R or D. A single point of failure
13:09
And the answer is
13:13
the answer is B M T t f. Meantime, to failure.
13:18
You know it's not any of the others. The empty TR is about recovery,
13:22
a recovery time objective, how long it takes to recovery and single point of failure. Are those critical systems within your organization.
13:33
This concludes the video for section 5.2 part of domain five Risk management for the Company of Security Plus 5 +01 security certification.
13:43
This session we summarized Business impact assessment or analysis concepts.
13:50
Please refer to your study material for more information on this. I look forward to talking with you more in future videos.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor