chapter1b Flashcards
Change Management
Process of making sure changes are made smoothly and efficiently and do not negatively affect systems reliability, security, confidentiality, integrity, and availability.
Impact Analysis
The identification of all work products affected by a change, including an estimate of the resources needed to accomplish the change.
Sandbox Testing
Isolated testing environment; no connection to the real world or production system; a technological safe space; use before making a change to production; try the upgrade, apply the patch; test and confirm before deployment; confirm the rollback plan; move everything back to the original; a sandbox can’t consider every possibility
Maintenance Window
The time period in which a change is expected to be implemented.
Technical Change Management
Put the change management process into action.; Execute the plan; There’s no such thing as a simple upgrade; Can have many moving parts; Separate events may be required; Change management is often concerned with ‘what’ needs to change; The technical team is concerned with ‘how’ to change it
Allow/Deny list
A list of applications that can or cannot be used on the network. Applications can have known vulnerabilities and introduce security risks.
Downtime
Refers to a period of time when a system is unavailable
Legacy Applications
Some applications were here before you arrived; They’ll be here when you leave; Often no longer supported by the developer; You’re now the support team; Fear of the unknown; Face your fears and document the system; It may not be as bad as you think; May be quirky; Create specific processes and procedures; Become the expert
Dependencies
The relationship between project activities. Changing one thing may affect many other processes.
Version Control
Track changes to a file or configuration over time
Public Key Infrastructure
Policies and procedures that are responsible for creating, distributing, managing, storing, and revoking as well as performing other processes associated with digital certificates.
Symmetric Encryption
An encryption method whereby the same key is used to encode and to decode the message
Asymmetric Encryption
Used in public key encryption, it is a scheme in which the key to encrypt data is different from the key to decrypt.
Transparent Encryption
Encrypt all database information with a symmetric key
Record level Encryption
Used when not all of the data is sensitive. Encrypting individual columns. Use separate symmetric keys for each column
Transport Encryption
Protecting data traversing the network.
Virtual Private Network (VPN)
A private data network that creates secure connections, or ‘tunnels,’ over regular Internet lines