SY0-501 Section 2.3 Given a scenario, implement appropriate risk mitigation strategies.
The selection and specification of security controls for an information system is accomplished as part of an organization-wide information security program that involves the management of organizational risk—that is, the risk to the organization or to individuals associated with the operation of an information system. The management of organizational risk is a key element in the organization’s information security program and provides an effective framework for selecting the appropriate security controls for an information system- –the security controls necessary to protect individuals and the operations and assets of the organization….
On-boarding/off-boarding business partners Transitioning with a business partner occurs either during the on-boarding or off-boarding of a business partner. Both the initialization and the termination of a close business relationship have serious security issues. During the on boarding of a new business partner, it is important to determine whether the security policies of both organizations are compatible, at least in areas where the two companies’ networks will interact. One area that usually does get adequate attention from most companies is the issue of interoperability agreements. These are documents that define…
SY0-501 Section 2.1-Explain the importance of risk related concepts.
Control types To prepare for the certification exam, it often helps to use analogies to put topics in con- text. In light of that, consider a residential home this author owns in the middle of town. I grow prized tomato plants in the backyard, and it is very important to me that no one goes back there for fear that they might do something to harm the tomatoes. Thus, I implement the following controls: Administrative: I establish a number of policies to keep the tomatoes safe: Preventive: I instruct every…
SY0-501 Section 1.5 -Given a scenario, troubleshoot security issues related to wireless networking.
WPA WPA is Wi-Fi Protected Access, one of several popular standards for wireless network security. This WPA is not to be confused with Windows XP Product Activation, a separate technology that is also included with the Microsoft Windows operating system. Before being able to use Wi-Fi WPA with Windows XP, you may need to upgrade one or more components of your network including the XP operating system and network adapters on some computers as well as the wireless access point Follow these instructions to set up WPA on Wi-Fi networks…
SY0-501 Section 1.4 – Given a scenario, implement common protocols and services.
IPSec Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet Protocol (IP) networks. IPsec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft implementation of IPsec is based on Internet Engineering Task Force (IETF) standards. In Windows 7, Windows Server 2008 R2, Windows Vista and Windows Server 2008, you can configure IPsec behavior by using the Windows Firewall with Advanced Security snapin. In earlier versions of Windows, IPsec was a stand-alone technology separate from Windows Firewall. One of…
SY0-501 Section 1.3 – Explain network design elements and components.
DMZ In computer networking, DMZ is a firewall configuration for securing local area networks (LANs). In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet. One or more computers also run outside the firewall, in the DMZ. Those computers on the outside intercept traffic and broker requests for the rest of the LAN, adding an extra layer of protection for computers behind the firewall. Traditional DMZs allow computers behind the firewall to initiate requests outbound to the DMZ. Computers in…
SY0-501 Section 1.2 Given a scenario, use secures network administration principles.
Rule-based management Traditional network management systems are implemented in a rules-based environment. Here, the functional areas of network management are performed based on a set of guidelines established by the administrative staff. Fault events, configuration setup, accounting recording, performance thresholds and security rules are all preset, based on best practices. One advantage of rules-based implementations is that the interaction between the managed device (agent) and the manager can be simplified to a very small set of actions. In the simplest case the agent responds to polls from the manager and…
This is no different from our daily lives. We constantly make decisions about what risks we’re willing to accept. When we get in a car and drive to work, there’s a certain risk that we’re taking. It’s possible that something completely out of control will cause us to become part of an accident on the highway. When we get on an airplane, we’re accepting the level of risk involved as the price of convenience. However, most people have a mental picture of what an acceptable risk is, and won’t go…
As you’re searching for IT jobs with the rest of the population, it can be a bit nerve-wracking as you begin to question whether your resume, job experience, or CV is really sticking out like you want it to. You’ve probably been told time and time again that a good CV is a way to get that job that you want — but no one ever really tells you what that even means. What makes a CV a good CV? And how can you get there? Whether you’re a network…
5 Microsoft Certifications To Boost Your Career In IT
Microsoft delivers a prospect for IT pros to authenticate their experience through a multiplicity of renowned certification courses. With numerous choices available, a number of enthusiastic system technicians aren’t sure from where to take a start. The most efficacious information technology professionals can categorize Microsoft elucidations their companies actually require and are enthusiastic enough to train in order to fill that title role. In spite of everything, no one desires to undertake a designation they actually dislike. If you are a system analyst or technician that is enthusiastic enough to…
Popular posts
Recent Posts