How IR, BC, and DR Relate to Each Other

These three concepts are often confused but serve distinct purposes. Think of them as three sequential layers of organizational resilience:

Incident Response Terminology

The CC exam will test distinctions between these terms precisely — know each definition:

Term
Definition
Event
Any observable occurrence in a network or system. Most events are routine and harmless. Not all events are incidents.
Incident
An event that actually or potentially jeopardizes the CIA of a system or its data. Every incident is an event, but not every event is an incident.
Breach
The loss of control, compromise, or unauthorized disclosure of PII. A breach is a specific type of incident involving PII exposure.
Exploit
A specific attack that takes advantage of a system vulnerability. Named because the attack exploits a flaw.
Intrusion
A deliberate security event in which an intruder gains (or attempts to gain) unauthorized access to a system or resource.
Threat
Any circumstance or event with the potential to adversely impact organizational operations through unauthorized access, disclosure, modification, or denial of service.
Vulnerability
A weakness in a system, its security procedures, or internal controls that could be exploited by a threat source.
Zero Day
A previously unknown vulnerability with no existing patch or signature. Defenders cannot patch what they do not know exists.

Incident Response Goals & Priority

The first and most important priority in any incident is life, health, and safety. Before anything else, always prioritize safety.

After safety, the primary goal is preparedness. An organization with a documented, tested IR plan before an incident occurs will respond far more effectively than one improvising in the moment.

The Four Phases of Incident Response

1. Preparation

This phase happens before any incident occurs:

Often overlooked:

Your primary communication method may be unavailable during a crisis. Phone trees, backup contact numbers, and out-of-band communication channels must be planned in advance — not improvised during the incident.

2. Detection and Analysis

3. Containment, Eradication, and Recovery

4. Post-Incident Activity

The Incident Response Team

A typical Incident Response Team (IRT) is a cross-functional group. Members typically include: representatives from senior management, information security professionals, legal representatives, public affairs/communications staff, and engineering representatives.

When an incident occurs, the team's four primary responsibilities are:

Dedicated incident response teams are often called CIRTs (Computer Incident Response Teams) or CSIRTs. Organizations may also establish a SOC (Security Operations Center) — a centralized function that continuously monitors, detects, and analyzes events on the network.

Business Continuity Planning

The intent of a BCP is to sustain business operations while recovering from a significant disruption. The focus is on continuity — keeping the business running, not just fixing the technical problem. Key components:

Disaster Recovery Planning

DR focuses on restoring IT and communications services after they have been disrupted. While BC is about keeping the business operating, DR is about getting the technology infrastructure back to full operational status. Key components:

Key Terms for the Exam

Term
Definition
Event
Any observable occurrence in a network or system
Incident
An event that jeopardizes CIA of a system or its data
Breach
Unauthorized access or disclosure of PII
Exploit
A specific attack leveraging a vulnerability
Zero Day
Unknown vulnerability with no existing patch or signature
IR
Incident Response — keeps business operating during a crisis
BCP
Business Continuity Plan — sustains operations through a crisis
DRP
Disaster Recovery Plan — restores IT after a disruption
SOC
Security Operations Center — centralized monitoring function
CIRT/CSIRT
Computer (Security) Incident Response Team