Chapter 18 Slide
Chapter 18 Slide
Network Operations
1
Episode 18.01
Episode What are Network Operations?
title:
Objective: 4.1 Explain common security concepts
2
Key Terms
• Security risks
• Business risks
• Documentation
• Nondisclosure agreement (NDA),
memorandum of understanding (MOU),
bring your own device (BYOD), statement of
work (SOW)
• Change management
3
Key Terms
• Disaster planning
• Forensics
• Incident response
• High availability
4
• Network operations is a broad term that
describes the actions needed to be taken to
protect the network and organization
• Two main risks are security and business
• High availability ensures that your network
doesn't go down
5
Episode 18.02
Episode Security Policies
title:
Objective: 3.2 Explain the purpose of organizational
documents and policies
6
Acceptable Use Policy
• Define ownership
• Web site access
• Access time
7
Remote Access Policy
• VPN
• Authentication
8
Password Policy
• Complexity
• Lockout
9
IT Safety Policy
• Lifting equipment
• Equipment handling
• Spills
• Procedures
10
License Restriction
• Usage
• Transfer
• Renewal
11
International Export Control
• Military information
• Nuclear information
• License keys
12
Key Terms
• Nondisclosure agreement (NDA)
13
• Security policies document to users how to
access system resources and what is
allowable and acceptable
• Safety policies apply to the IT department
too!
• NDAs, software licensing, and data
restrictions need to be considered to protect
an organization
14
Episode 18.03
Episode Change Management
title:
Objective: 3.2 Explain the purpose of organizational
documents and policies
15
Key Terms
• Change management... here we go!
• Change management team... action figures!
• Some are even human
• Strategic change vs. infrastructure change
• Documentation is the last step in change
management process
16
• The change management team handles
infrastructure-level changes
• The change process includes requests,
types of changes, configuration procedures,
rollback and more
• The end game is documentation of all the
changes made
17
Episode 18.04
Episode Patching and Updating
title:
Objective: 4.3 Given a scenario, apply network hardening
techniques
18
Key Terms
• Patching
• Operating system updates
• Driver updates
• Firmware updates
• Research
• Test
• Configuration backups
19
• Operating system updates are the most
common type of update
• Firmware updates are necessary, but they
depend on the device
• Before patching, be sure to research, test,
and configure backups
20
Episode 18.05
Episode Security Risk Management
title:
Objective: 4.1 Explain common security concepts
21
Key Terms
• Asset
• Threat assessment
• External threats
• Internal threats
• Natural events
• Natural disasters
• Vulnerability assessment
• Penetration (pen) testing
22
Key Terms
• Posture assessment
• Business risk assessment
• Vendor assessment
• Process assessment
23
• A vulnerability assessment can point out
potential weaknesses in your organization
• Pen testing is used to examine the strength
of your network security
• A risk posture is an overall look at security in
the organization
24
Episode 18.06
Episode Points of Failure
title:
Objective: 3.3 Explain high availability and disaster
recovery concepts and summarize which is the
best solution
25
Key Terms
• Critical assets
• High availability (HA)
• Virtual IP
• Redundancy
• Fault tolerance
• Clustering
• Load balancing
26
• A single point of failure is one system that, if
it fails, will bring down an entire process,
workflow, or the whole organization
• Critical assets are the systems needed to
maintain production
• Critical nodes are the devices needed to
maintain the network
• The key to maintaining production on the
network is to avoid a single point of failure
27
Episode 18.07
Episode Standard Business Documentation
title:
Objective: 3.2 Explain the purpose of organizational
documents and policies
28
Key Terms
• Service Level Agreement (SLA)
• Memorandum of Understanding (MOU)
• Multi-Source Agreement (MSA)
• Statement of Work (SOW)
29
Service Level Agreement (SLA)
30
Memorandum of Understanding (MOU)
31
City of Houston Hospital Patient
Exchange Disaster MOU
• Cost
• Logistics
32
Statement of Work (SOW)
• Legal contract between two parties (vendor
and customer)
Defines services to be performed/supplied
Defines time frame/deliverables
Defines milestones/defines progress
33
• Standard business documentation is
common in networking
• Standards on the exam include SLA, MOU,
MSA, and SOW
• These are real-world standards
34
Episode 18.08
Episode Incident Response and Forensics
title:
Objective: 4.1 Explain common security concepts
35
Key Terms
• Forensics
• First responder
• Secure the area
• Document the scene
• Collect evidence
• Chain of custody
• Forensics report
• Legal hold
• Electronic discovery (e-discovery)
36
• The first responder is the person who must
report an incident as soon as it happens
• If the first responder faces a serious threat,
they must escalate it to the proper people
• The four-step process of forensics is secure
the area, document the scene, collect
evidence, and interface with authorities
(submit forensics report)
37
Episode 18.09
Episode Disaster Recovery and Backups
title:
Objective: 3.3 Explain high availability and disaster
recovery concepts and summarize which is the
best solution
38
Key Terms
• Backup plan assessment
• Recovery point objective (RPO)
• Recovery time objective (RTO)
• Configuration data
• State data
• Mean time to repair (MTTR)
• Mean time to failure (MTTF)
• Mean time between failures (MTBF)
39
Key Terms
• Snapshots
• Local backups
• Offsite backups
• Cloud backups
40
• A single point of failure is one system that, if
it fails, will bring down an entire process,
workflow, or the whole organization
• Critical assets are the systems needed to
maintain production
• Critical nodes are the devices needed to
maintain the network
• The key to maintaining production on the
network is to avoid a single point of failure
41
Episode 18.10
Episode Business Continuity
title:
Objective: 3.2 Explain the purpose of organizational documents and
policies
3.3 Explain high availability and disaster recovery concepts
and summarize which is the best solution
42
Key Terms
• Business continuity plan (BCP)
• Disaster recovery
• Business continuity
• Distance and location
• Internet requirements
• Housing and entertainment
43
Key Terms
• Legal issues
• Annual exercises
• Failover
• Alternative processing sites
• Alternative business practices
• After action reports
44
• Contingency planning (business continuity
planning) attempts to mitigate incidents to
preserve business functionality
• Understand the pros and cons of the offsite
options available: cold site, warm site, hot
site, cloud site
• Thorough planning and practice is what
makes recovery plans successful when
disasters occur
45
Episode 18.11
Episode Deployment Models
title:
Objective: 3.2 Explain the purpose of organizational documents and
policies
5.5 Given a scenario, troubleshoot general networking issues
46
Key Terms
• Bring your own device (BYOD)
• BYOD policy
• Acceptable use policy (AUP)
• Onboarding policy
• Offboarding policy
• Mobile Device Manager (MDM)
• BYOD challenges
47
Key Terms
• Corporate-owned, business only (COBO)
• Corporate-owned, personally enabled
(COPE)
• Choose your own device (CYOD)
48
• A bring your own device (BYOD) policy
enables employees to use their own device
on the network
• The Mobile Device Manager (MDM) can
manage mobile devices brought by
employees
• The organization should establish which
data is controlled by the user and which is
controlled by the organization
49