Chapter 8 - 06 - Understand the Fundamentals of CM and Asset Management - 01_ocred_fax_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
EC-Council
Tags
Related
- Chapter 8 - 06 - Understand the Fundamentals of CM and Asset Management PDF
- Chapter 8 - 06 - Understand the Fundamentals of CM and Asset Management - 03_ocred_fax_ocred.pdf
- Lesson 2: Governance and Risk Management PDF
- Introductory Overview-Module 2 & 3- Cybersecurity Domains & Network Security PDF
- Cybersecurity: Protecting Your Digital Landscape PDF
- Glossary of Cybersecurity Terms PDF
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Module Flow Discuss Threat Hunting...
Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Module Flow Discuss Threat Hunting Discuss Various Threat Intelligence Feeds and Sources Discuss Vulnerability Assessment Discuss Ethical Hacking Concepts Understand Fundamentals of Penetration Testing and its Benefits Understand the Fundamentals of Configuration Management and Asset Management Understand the Fundamentals of Configuration Management and Asset Management Asset management helps organizations control, track, and supervise the life span of assets from purchase to disposal. Configuration management helps in monitoring and tracking the configurations and relationships among various IT components. This section discusses the concepts of asset management, configuration management, and change management. Module 08 Page 1116 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools What is Asset Management? Q Asset management is a process of maintaining an organization’s assets such as systems, printers, software or hardware ° devices, and other spare parts in cost-effective manner, which helps in the growth of the organization and in fulfilling the business goals Q 1t assists the management in tracking all the information about tangibles and intangibles involved in business development Asset Management................................... A v' Financial assets v’ Systems v' Reputation v Land v Human capital v Building v Intellectual property v' Other physical assets Copyright © by EC-( cil. All Rights Reserved. ReproductionIs Strictly Prohibited. What is Asset Management? Asset management is a process of monitoring and managing an organization’s assets such as systems, printers, software or hardware devices, and other devices in a cost-effective manner, which helps in the growth of the organization and in fulfilling the overall business goals. The asset management process involves the tracking and handling of all aspects ranging from procurement to the detachment of the assets from service. It helps in maintaining asset information such as asset name, model number, asset type, asset ID, location of the asset, and owner of the asset in the asset management database. It assists the management in tracking all the information about tangibles (such as financial assets, company reputation, intellectual property, and human capital) and intangibles (such as systems, land, building, and other physical assets) involved in business development, performing financials audits, and maintaining inventory. This process makes it easier to improve visibility, optimize usage, and analyze the assets to make any changes required in the future. Module 08 Page 1117 Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Asset Identification Methods Standard Naming Conventions O A standard naming convention of assets is used to identify each asset individually with a unique name assigned to it O Example: barcode or RFID tag with a unique number/name Internet Protocol (IP) Schema O It stores the subnet information of an IP address space and the range of IPs used in each subnet Copyright © by All Rights Reserved. Reproductionis Strictly Prohibited Asset Identification Methods It is important to have an asset management procedure in every organization to track the availability of assets, condition of assets, maintenance time, replacement cost of assets, and location of assets; asset management also prevents assets from unknown modifications and theft. The following methods can be used to identify the assets related to an organization. = Standard Naming Conventions A standard naming convention of assets is used to identify an asset individually with a unique name assigned to it. Based on convenience, every asset is provided a barcode or RFID tag, which contains a unique number/name and is stored in the asset management database. To identify each asset separately, these identification tags are attached to various assets such as hardware devices, accounts, and virtual machines as well as to non-functional resources such as tables and furniture. Organizations follow some standard rules for assigning a name that consists of multiple attributes describing the type of asset, operation of the asset, number of assets, and even the location of the asset in some cases. = Internet Protocol (IP) Schema An IP schema stores the subnet information of an IP address space and the range of IPs used in each subnet. If an organization consists of multiple departments with several systems in a single IP address space, it is necessary to subdivide the network into parts, which are called subnets. An IP schema helps the administrator in managing the subnets and applying ACLs specific to that subnet; it also facilitates the monitoring of the systems for security. Administrators use IP address management software to manage the IP address usage in a subnet. This software provides the list of available IP addresses in the address pool. Module 08 Page 1118 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Asset Management Tools It provides deep insights into IT, software, and cloud xAssets assets. It optimizes IT operations and supports :;eshsenncetl'; Afs::t ITAM customized reporting h,,;fl;ffi’,?,fk“mf are 0090 [P — Y Y T ———— 00 NinjaRMM https://www.ninjormm.com ManageEngine AssetExplorer https://www.monogeengine.com Spiceworks IT Asset Management Software https://www.spiceworks.com Asset Panda https.//www.assetponde.com https//www xassets.com ey ot o Asset Management Tools Asset management solutions are centralized databases or systems used to monitor and record all the services as well as physical and non-physical assets serving the business. These centralized systems enable the management to view the location, functionality, and condition of assets. = xAssets ITAM Source: https://www.xassets.com xAssets ITAM provides deep insights into IT, software, and cloud assets. It optimizes IT operations and supports customized reporting. Furthermore, it saves expenditure on asset reuse, software optimization, and efficiency improvement. Module 08 Page 1119 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools R FALEOMG IVT At Masapesent BT T Dot T At M T e e eT Qisaat IR- X0.‘Q ifH '..m: Figure 8.19: Screenshot of xAssets ITAM The following are some additional asset management tools: = Freshservice IT Asset Management Software (https://freshservice.com) (https.//freshservice.com) = NinjaRMM (https://www.ninjarmm.com) * ManageEngine AssetExplorer (https://www.manageengine.com) = Spiceworks IT Asset Management Software (https://www.spiceworks.com) (https.//www.spiceworks.com) = Asset Panda (https://www.assetpanda.com) (https.//www.assetpanda.com) Module 08 Page 1120 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.