Lecture 4 - Operational Issues and Policy
Lecture 4 - Operational Issues and Policy
Asset Management is a systematic process of operating , maintaining, and upgrading assets cost-
effectively, (American Associate of State Highway and Transportation Officials).
The process by which built systems of facilities are monitored and maintained, with the objective of
providing the best possible service to users.
Standards
“A standard is a set of agreed rules and guidelines for common and
repeated use for a particular, pre-defined, purpose. It needs to lay down
a solid and equitable foundation for the global exchange of goods
and services, incorporating all the key elements required by market and
social forces.” (Quote from ISO definition).
It is important to have the ability to process and communicate
information in a completely unambiguous way in order to reduce
the cost of managing data information and provide clarity both internally
as well as with external customers and suppliers.
The use of Standards, and which Standards to adopt, needs to be
assessed within an overall business requirement.
Internal standardization is more urgent than external. In other
words, first standardize the internal business processes and then adopt
coherent internal technical standards, before investing time and
resource to external Standards.
Although there are many Standards to choose from, they need to be
selected and adopted in order to achieve the cost benefits.
What are the Risks of applying
standards?
There are too many technical Standards to choose from. The need to
support multiple Standards results in extra costs and can limit effective
communication between business parties.
Some organizations can finish up with two or more systems each with
different Standards. The adoption of different Standards in the same
business process results in increased cost and less effective
management information.
Standards are not yet finalized which can result in ongoing / continual
costs making the lifetime cost of ownership too high.
Standards are being developed too slowly which results in
customization and hence costs to each organization. There is also
duplication and ’islands’ of Standards, typically within market
communities.
There is a risk of costs in determining which Standards to use and
a risk of picking a Standard which is superseded in the future. Standards
which can be further developed, but continue to support backwards
compatibility, typically reduce the overall cost of maintenance and
upgrades.
Enforcement
Contracts
Authentication
Jurisdiction
Liability
a. Content Regulation
b. Advertisement
c. Electronic Payment Issues
d. Foreign Direct Investment
e. Corporate Structure and Funding
Disaster recovery
A quick and simple network change turns into disaster when instead of
disconnecting the correct cable, you actually disconnect the cable to a
critical server.
A security audit requires you to document the physical path location of
cables carrying sensitive information and who has access to those
cables. But your documentation of cable location and the identity of all
the endpoints to which they are connected is out of date.
Network auditing
1) Use outside vendors to conduct and audit. This will ensure that there is
no favoritism or politics in the results, and provide credibility with senior
management. Ensure the vendor or contractor you use covers the items
listed below as a minimum. Find out who will be conducting the audit
and review resume and references from past audited companies. Ensure
goals of the audit are adhered to.
2) It is highly recommended that you perform an internal audit prior to
outside audit so you can compare results.
3) Establish and document baseline performance of all network
components.
4) Review, document and analyze controls over Internet, intranet and
network resources.
5) Review and document all network connections, client/server, LAN, WAN,
etc.
6) Review and document controls over network operations and
Performing a network audit
7) Review and assess network segmentation and identify and audit any
internal firewalls.
8) Review and assess a single point of failure analysis. How is your network
affected by critical equipment? Do you have backups installed and
ready?
9) Prepare a risk assessment and develop and implement a risk mitigation
plan.
10) Review and document all software licenses required/possessed for all
locations.
11) Verify and record all installed software. Remove all unauthorized
software and secure hardware and software to prevent future downloads
or installations.
THE END