Operational Procedures: Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts. Flashcards
CompTIA A+ 220-1102 Exam Criteria
What type of incident we need to look for?
an event that disrupts normal business operations
The context is prohibted content in the work place. - Gambling/ adult sites etc
what is an incident response plan is?
Incident Response Plans
Documented plan outlining the steps to take following the discovery and confirmation of an incident.
What is an incident Response Procedure?
Preparation
Training
Practice drills (mock data breaches)
Ensuring all resources are approved and funded
What happens on an Event of an incident before taking the procedure?
Identification
Determining if there is a breach (violation of a security policy)
What comes after Containment?
Containment
Data preservation (Drive seizure or copying)
Data integrity
Chain of Custody – evidence chain of custody form
What is followed after containment?
Eradication (only for other types of breaches)
Determine root cause of breach
Malware removal
After containment what must you follow up on doing?
Recovery
Reintroduce affected systems into production environment
Reimaging, restore from backup
Continuous Monitoring
To complete the whole Incident procedure what must we record after recovery?
Lessons Learned
Discuss the breach
What has the incident response team learned after the IRP was implement
What can the team do better next time.
What does an Open-Source license allows to do?
An open-source license allows you to modify an application’s source code, creating a customized version of the software. Most open-source software is available for free, and the software publisher generates revenue through service contracts, technical support, and add-on features. Some examples of open-source operating systems are Chrome OS and Android.
What does DRM mean?
Digital Rights Management (DRM) controls how users may consume, install, store, or otherwise interact with copyrighted material they have purchased, such as e-books and digital music files.
Personal Use License vs. Corporate Use Licenses
A personal use license is meant to be used by an individual. A single personal license may allow you to install the software on one or more systems. For example, Office 365 is a subscription-based software that can be installed on five systems at one time.
Corporate use licenses are meant to be used within organizations. Individual users use them but only for business purposes on their laptops or desktops. Organizations fund corporate licenses for users.
What is EULA?
EULA
EULA is the End User License Agreement. Each software, such as enterprise or commercial, is equipped with EULA, which states how an end-user should use the software. For example, EULA may state that the software is meant only for personal purposes and cannot be used for commercial use.
There are two types of EULA:
Shrink wrap: These are placed on the software boxes. The user would consent to the EULA by breaking the shrink wrap.
Clickwrap: These are built within the software. The user must accept the EULA to use the software. These are also found on Websites. For example, you would accept the EULA, and then you can access the online services being offered on the Website.
What is a Commercial License?
For a commercial license, the source code is closed and proprietary to the developer, and not available for modification. Some examples of commercially-licensed operating systems are Microsoft’s Windows and Apple’s iOS.
What is enterprise license?
Enterprise licenses are geared towards larger companies that need to install the software on hundreds or thousands of machines. Enterprise licenses are less expensive than personal licenses for each installation, although the overall price will be much higher because of the high volume of licenses that will be purchased. An enterprise license is typically granted for a commercial application. Some open source operating systems have licenses, but most of them do not.
Within any given company, many devices, programs, and applications require licenses for an organization to legally own and use their services. As an organization grows, it can become cumbersome to manage these licenses, but doing so is important to prevent any legal trouble or fines. Your organization should implement routine license monitoring to ensure that every license in use is valid or due to expire. The IT department should keep careful track of all licensed resources, including software and hardware, and should manage those licenses to ensure that services are not interrupted.
What happens to an expired license vs non-expired license?
An expired license, even for a service or application that you purchased, means that the organization or system is no longer authorized to use the application. Continuing to use the application after license expiration could result in legal and security issues. Legal issues arise when the organization no longer has rights to use the software, and security issues arise when the organization can no longer use the vendor’s licensed services to update the software. A non-expired licenses means the organization can still use the software and obtain regular updates from the software vendor.