expand for answer

Structured Walkthrough

A type of disaster recovery test, often referred to as a “table-top exercise,” in which members of the disaster recovery team gather in a large conference room and role-play a disaster scenario.

Similar items:
A process in which copies of the disaster recovery checklists are distributed to the members of the disaster recovery team for their review.
A test in which disaster recovery team members are presented with a scenario and asked to develop an appropriate response. Some of these response measures are then tested. This may involve the interruption of noncritical business activities and the use of some operational personnel.
A group of people duly authorized to conduct attacks against friendly information systems, under prescribed conditions, for the purpose of revealing the capabilities and limitations of the information assurance posture of a system under test. For purposes of operational testing, the Red team will operate in as operationally realistic an environment as feasible and will conduct its operations in accordance with the approved operational test plan. Interdisciplinary group of individuals authorized to conduct an independent and focused threatbased effort as a simulated adversary to expose and exploit system vulnerabilities for the purpose of improving the security posture of information systems.
Specially designed room used for wiring a data or voice network. Wiring closets serve as a central junction point for the wiring and wiring equipment that is used for interconnecting devices. The room where the networking cables for a whole building or just a floor are connected to other essential equipment, such as patch panels, switches, routers, LAN extenders, backbone channels, and so on. A more technical name for wiring closet is premises wire distribution room.
An access control management simplification mechanism similar to a role. Similar users are made members of a group. A group is assigned access to an object. Thus, all members of the group are granted the same access to an object. The use of groups greatly simplifies the administrative overhead of managing user access to objects.

There are no comments yet.

Authentication required

You must log in to post a comment.

Log in