Network Operations Flashcards
Security and Business Risks are both areas for:
Risk Management
Information such as Non-disclosure agreements ( NDA ), memorandum of understanding ( MOU ), bring your own device (BYOD), and statement of work (SOW) are just a few of the __________regarding Network Operations
Documentation
this is an area where everyone knows and are concerned with any changes with in the network
Change management
Basically a plan for relocating the network in case of an emergency
Disaster Planning
Collecting data and all the information when something goes down is known as:
Forensics or Incident Response
Using fault tolerance and redundancy to help prevent your network from going down, and what type of backup plans you have to keep everything up and running
High Availability
There are 4 security policies:
Acceptable use Policy - Defines ownership, what website that are allowed, Access time on the network
Remote Access Policy - Using a VPN, Authentication, Authorization
Password Policy - complexity, Password age, lockout policy
IT Safety Policy - Lifting equipment, Equipment handling, spills, procedures or how to’s
These are 3 terms regarding documentation:
- Non-disclosure agreements ( NDA ) - says you can not talk about
something you learn or find out while employed with your company - License Restriction - Usage, Transferring, and renewals
- International Export Control - Military information, Nuclear
Information, and License Keys`
These are 2 different types of Change management:
Strategic Change - massive change that affects the business structure
Infrastructure change -
A Change request is normally using when submitting a change:
Types of Change, Hardware or Software
Configuration Procedures
Rollback Process
What will the over Potential Impact be
Notification to everyone in the organization
Documentation is highly recommended when implementing a Change request:
Make sure everything about the change is documented.
Before _________ any devices, be sure to research, test, and configure backups.
Patching
__________ updates are necessary but they depend on the device.
Firmware
__________ ___________ updates are the most common type of update
Operating System
A ________ _________ is an overall look at security in the organization
Risk Posture
______ ________ is used to examine the strength of your network security
Pen Testing
this is a common IP that’s shared by multiple systems
Virtual IP
A _______ _______ _________ is one system that, if it fails, will bring down an entire process, workflow, or the whole organization.
Single point of failure
______ _______ are the systems needed to maintain production
Critical Assets
_________ __________ are the devices needed to maintain the network
Critical node
the Key to maintaining a production on the network is to avoid a ______ ________ __________
Single point of failure
This document is between the customer and service provider. it defines the scope, quality, an terms of service to be provided.
Service Level Agreement or ( SLA )
this document defines the agreement between two parties, is used where a legally binding contract is inappropriate
* definition of duties
* time frame
memorandum of understanding ( MOU )
this document is an agreement between say manufacturers that say they will continue to make parts for each other
Multi-source agreement ( MSA )
this document is a legal contract between 2 parties ( vendor and Customer)
* Defines services to be performed / supplied
* Defines time frame / deliverables
* Defines milestones / defines progress
Statement of Work ( SOW )
things that should be done when a incident happens:
Secure the area
Document the Scene
Collect evidence
Chain of Custody
Forensics Report to authorities
A ______ _______ is the person who must report an incident as soon as it happens.
First Responder
this is the state of data once it has been reovered
Recovery Point objective (RPO)
this is the actual time needed to 4 restore / recover full functionality of an organizations network once it seizes to function
Recovery time objective ( RTO )
To data types when it comes to backups:
Configuration data
State
Backup methods include:
Full Backup
Differential Backup - means to backup all changes since the last full
Incremental Backup - only backs up changes made from last backup
Offsite Backups
Cloud Backups - takes a lot of time for the first full backup
this backup is mainly seen on Virtual Machine. they are perfect way of making a copy of something that happened in the past and are not typically stored on separate media.
Snapshots
When working with local backups you need to think about mediums:
Tapes
External Hard drives
the failed time to repair a disaster is known as
( MTTRepair )
the time a system is repaired until it goes down again is known as:
( MTTFailure )
the time a system fails, it’s repaired and, it fails again is known as:
( MTBF ) or mean time between failures
Backup site that are part of your evacuation plan include the following:
Cold Site
Warm site
Hot site
this type of recovery site takes weeks to bring online, it a basic office space, has no operational equipment, and is the cheapest
Cold Site
this type of recovery site will take days to bring on line and it does have operational equipment
Warm Site
this type of recovery site only takes hours to bring online an it has real time synchronization, almost all data is ready to go - often will need a quick update, and are very expensive
Hot site
When choosing your recovery site you might want to think of:
Distance and location
Internet requirements - for Housing and Entertainment
Legal issues
Your business continuity should include:
Annual Exercises.
Alternative Processing Sites
After action Reports
Cloud site backups
______ _______ attempts to mitigate incidents to preserve business functiionality
Contingency or business continuity planning
thorough __________ and _________ practice is what makes recovery plans successful when disasters occur.
planning and practice
BYOD stands for:
Bring your own device
AUP stands for
Acceptable use Policy agreement
this allows a company to connect to a mobile device from a centralized location to be able to control and manage that device
Mobile Device Manager (MDM)
BYOD challenges include:
Personal use versus Business use
The MDM should be able to manage a device from anywhere
Personal data versus company data
this is where the corporation owns all the devices you use
Corporate-owned, business only (COBO)
this is basically the same as COBO but the users will receive an approved list of items or apps they can use.
Corporate-owned/issued, personally enabled ( COPE )
this is basically the same as COBO but the users can actually choose their devices
Choose your own device ( CYOD )
A _________ assessment examines any possible security threat, like looking at threats from actors
Posture