Is Operations - 4
Is Operations - 4
Hardware
Firmware – hardcoded/embedded built-in software – device brain, helps the device start up,
perform its functions, and communicate with other software
Os
Runtime envs
Apps
Individual libraries
Patching Process
Process & Infrastructure must be in place to get
patches in; a team or an assess identification tool.
Patching Problems
- Can create new vulnerabilities
- Production interruptions
- Not enough testing or rollback process in place.
- Out of date asset management – you miss stuff
- Admin work load is already heavy and patches are time sensitive. Should be done immediately
Configuration Management - CMDB
Management logical description – the settings of the systems. Configuration of the IT environment
It all should be kept in Configuration Management Database; a CMDB. ITIL is all about putting stuff into
the CMDB. All documentations and config files should be recorded in there.
Enterprise Monitoring
Network/SOC – Network or security operation center do the following:
- Event logging
- Traffic monitoring
- Security monitoring
- Vulnerability, pen testing
IH Process
- Tier 1 – pleb
- Tier 2 – more knowledgeable/skilled , remote desktop
- Tier 3 - highest tier- talking to an actually developer of a system - the guy who writes the
firmware
Staggered approach. The lower skilled maybe outsourced. Then you get into the higher tiers, higher
skilled, more expensive, support folks.
- Service delivery best practices for managing and delivering IT services within an organization.
Biggest one. A toolbox for managing IT services
- 4 parts: Service Design, Service Transition, Service Operation, Continual Service Improvement.
ISO 20000-1:2011
Backup Types
Full – everything. Fastest to restore but longest to preform backup.
Incremental – all files that changed since last backup (any backup). Restore in order. Increment 1, then
2, then 3 for full restore.
Differential – all changes since last full back up. Restore the last full backup, and the very last differential
backup.
Network Redundancy
Backup paths or alternative routes for network access
- Anyone with access to the network traffic between your local device and the remote server can
easily intercept and read the data.
Secure Shell (SSH) have become the standard for remotely accessing devices and servers. It provides
encryption and authentication, making it much more secure than Telnet for remote access.- or secure
VPN.