Escolar Documentos
Profissional Documentos
Cultura Documentos
|
Learning Objectives (continued)
|
Introduction
|
èhe I2O Network Management Model
|
èhe I2O Network Management Model
(continued)
x ive areas of I2O model transformed into five areas of
security management:
x ault management
x Performance management
|
ault Management
x Configuration identification
x Configuration control
x Configuration audit
|
Accounting and Auditing Management
x Chargeback accounting enables organizations to
internally charge for system use
|
Performance Management
|
2ecurity Program Management
|
èhe Maintenance Model
|
igure 12-1 - èhe Maintenance Model
|
Monitoring the External Environment
|
|
Data 2ources
|
Monitoring, Escalation, and Incident
Response
x unction of external monitoring process is to monitor
activity, report results, and escalate warnings
|
|
Monitoring the Internal Environment
|
èhe Role of Iè Governance
|
Planning and Risk Assessment
|
Planning and Risk Assessment (continued)
x Primary objectives
|
Vulnerability Assessment and Remediation
|
Internet Vulnerability Assessment
|
Intranet Vulnerability Assessment
|
Modem Vulnerability Assessment
|
Remediating Vulnerabilities
|
èhreat Removal
|
Vulnerability Repair
x Accomplished by:
x Policy review
x Program review
x Rehearsals
|
|
2ummary
|
2ummary
|