Section 18:management risk

Get Started. It's Free
or sign up with your email address
Section 18:management risk by Mind Map: Section 18:management risk

1. - 4- statement of work:

1.1. A statement of work is a legal contract between a vendor and the customer

2. 114. What is risk management

2.1. - risk management use to secure infrastructure or source of information from threats

2.2. - Security polices incorporate practice required by laws and standards

2.3. - Security policies are documents and document that define how you will go about doing the security to your infrastructure for your organization

2.4. - Security control detail specifics and lead to procedures, and security procedure would be when setting up a user in windows on the domain

3. 116. Change management

3.1. - Strategic change is a massive change that is going to substantially affects the business of the infrastructure itself

3.2. - The change process includes requests , types of changes, configuration procedures, rollback and more

3.3. - The last step in change management is documentation

4. 118. Points of failure

4.1. - Critical nodes are IT assets like servers

4.2. - Failover means to have something ready to take over in case of failure

4.3. - Virtual IP simply means to have an IP address that is not overtly assign to a particular port somewhere

4.4. - Use HSRP or VRRP for router redundancy

5. 115. Security policies

5.1. - security policies is a document and it’s written down and it says how we are going to be dealing with security for some aspects of our infrastructure

5.2. - There are two type of security policies on the network plus : acceptable use policy and network security policy

5.2.1. - Acceptable use policy defines what can you do with people’s equipment within the infrastructure

5.2.2. - Network access policy defines what people can do and specifies who get specific access to the network

6. 117. User training

6.1. The steps of starting good users training:

6.2. - acceptable use policy must be read and signed

6.3. - Users should get training in password policies

6.4. - Users need training on systems

6.5. - Teach users about social engineering

6.6. - Train users to avoid malware

7. 119. Standard business documentation

7.1. - network plus only covers 4 very specific types of standard business documentation

7.1.1. - 1- service level agreement ( SLA ) between customer Service provider it’s designed to define the scope of the quality the terms of service that are to be provided

7.1.1.1. so somethings are going to be seeing on a typical SLA are going to be the definition of the service

7.1.2. - 2- memorandum of understanding : understand it is used between organizations that wouldn’t normally be the type of people that could make legal contracts of business , it’s occurring between two parties

7.1.3. - 3- multi source agreement