OBJ 3.2 X Flashcards
Change management
▪ Structured way of changing the state of a computer system, network, or IT procedure
▪ Make sure the risks are considered prior to implementing a system or
network change
● Planned
● Approved
● Documented
Incident response plan
▪ Contains instructions to help network and system administrators detect, respond to, and recover from network security incidents
● Preparation
● Identification
● Containment
● Eradication
● Recovery
● Lessons learned
Disaster recovery plan
▪ Documents how an organization can quickly resume work after an
unplanned incident
Business continuity plan
o Outlines how a business will continue operating during an
unplanned disruption in service
o A disaster recovery plan will be referenced from a business
continuity plan
System life cycle
Describes the approach to maintaining an asset from
creation to disposal
Standard operating procedures
A set of step-by-step instructions compiled by an organization to help its employees carry out routine operations
Password policy
A set of rules created to improve computer security by motivating users to create and properly store secure passwords
Acceptable use policy
A set of rules that restricts the ways in which a network resource may be
used and sets guidelines on how it should be used
Bring your own device (BYOD) policy
▪ Allows employees to access enterprise networks and systems using their personal mobile devices
▪ Create a segmented network where the BYOD devices can connect to
Remote access policy
A document which outlines and defines acceptable methods of remotely connecting to the internal network
Onboarding and offboarding policy
Onboarding- A documented policy that describes all the requirements for integrating a
new hire into the company and its cultures
Offboarding- A documented policy that covers all the steps to successfully part ways with an employee who’s leaving the company
Security policy
A document that outlines how to protect the organization’s systems,
networks, and data from threats
Data loss prevention
▪ A document defining how organizations can share and protect data
▪ Data loss prevention policy minimizes accidental or malicious data loss
▪ Set proper thresholds for your DLP policy
Physical network diagram
Shows the actual physical arrangement of the components that make up the network
Logical network diagram
Illustrates the flow of data across a network and shows how devices
communicate with each other