System Implementation and Operations

FacebookTwitterGoogle+LinkedInEmail
Description
This lessons continues to cover knowledge statements. Examples include:
  • Knowledge of the Information Infrastructure Library
  • Knowledge of the IT control functionary of IT infrastructure
Participants also learn about physical security components and understanding digital forensic techniques. [toggle_content title="Transcript"] So, starting with the implementation of our systems and operations at the high level, what we’re thinking about here is how do we deal with all of the different various moving parts an organization has within its IT departments? There are a lot of things to think about. We have the hardware, software and firmware as broad categories. We also have to think about licensing, our change control process, how we implement our security controls, how we deal with physical security. So, typically, we think about physical security as gates, guns, guards, locks, security cameras lighting is even considered a physical security component. And then tying all this together we have to also understand who’s responsible for all these different aspects of the organization. What are the roles and responsibilities involved and how do they interact with each other when discussions arise or maybe when you’re revising your procedures and your policies. We have to think about how we manage our databases. If databases are not managed correctly, they can become unwieldy and exhibit poor performance. So that’s one area where some expertise will be expected, whether it’s a database administrator or a consulting firm that comes in to do some work. The bottom line is that we want our databases to perform well and be maintained properly. We have to think about how we do our system analysis, performance monitoring of those systems. How do we manage our logs? What kind of log monitoring tools do we use? How do we deal with the storage of confidential information? How do we retrieve that safely? How long do we have to keep the information around? Then, pulling some of this all together in the events of problems related to hacking, and so on we have to have some understanding of digital forensic techniques. [/toggle_content]
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel