Chapter 18: Managing Risk Flashcards
Risk Management
The process of how organizations deal with the bad things that take place on their networks.
Data Breach
Any form of attack where secured data is taken or destroyed.
Acceptable Use Policy
Defines what is and what is not acceptable to do on an organization’s computers
Network Access Policy
Defines who may access the network, how they may access the network, and what they access.
Change Management
The process of creating change in your infrastructure in an organized, controlled, safe way
Strategic-Level Changes
Typically initiated by management and major in scope.
Infrastructure-Level Changes
Typically initiated by a department making a request to the change management team
A good change request will include:
1) Type of change
2) Configuration Procedures
3) Rollback Process
4) Potential Impact
5) Notification
Patch Management
Regularly updating operating systems and applications to avoid security threats.
When do we generally apply driver updates?
To fix an incompatibility, incorporate new features, or repair a bug.
Vulnerability Patch
A patch used to quickly respond to a major vulnerability.
It’s important that users understand:
1) Security Policies
2) Passwords
3) System and Workplace Security
4) Social Engineering
5) Malware
Single Point of Failure
One system that, if it fails, will bring down an entire process, workflow or organization.
High Availability (HA)
The ability for a system to keep working without interruption or downtime.
Failover
The ability for backup systems to detect when a master has failed and the to take over.
Virtual IP
A single IP address shared by multiple systems.
Virtual Router Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP)
Take multiple routers and gang them together into a single virtual router with a single virtual IP that clients use as a default gateway.