Chapter 8 - 06 - Understand the Fundamentals of CM and Asset Management (PDF)
Document Details
Uploaded by barrejamesteacher
null
EC-Council
Tags
Related
- Service Transition - Preparing for Change PDF
- Chapter 8 - 06 Configuration Management Fundamentals PDF
- Chapter 8 - 06 - Understand the Fundamentals of CM and Asset Management PDF
- Certified Cybersecurity Technician Exam 212-82 - Organizational Policies - PDF
- Chapter 8 - 06 - Understand the Fundamentals of CM and Asset Management - 02_ocred_fax_ocred.pdf
- PromoMats Brand Portal Training FINAL PDF
Summary
This document discusses the fundamentals of configuration management and asset management in IT. It explains how organizations control and track assets and their configurations throughout their life cycle. The text highlights relevant procedures and methods.
Full Transcript
Certified Cybersecurity Technician Network Security Assessment Techniques and Tools Exam 212-82 Module Flow Discuss Threat Hunting Discuss Various Threat Intelligence Feeds and Sources Discuss Vulnerability Assessment Discuss Ethical Hacking Concepts Understand Fundamentals of Penetration Testing an...
Certified Cybersecurity Technician Network Security Assessment Techniques and Tools Exam 212-82 Module Flow Discuss Threat Hunting Discuss Various Threat Intelligence Feeds and Sources Discuss Vulnerability Assessment Discuss Ethical Hacking Concepts Understand Fundamentals of Penetration Testing and its Benefits Understand the Fundamentals of Configuration Management and Asset Management Understand the Fundamentals of Configuration Management and Asset Management Asset management helps organizations control, track, and supervise the life span of assets from purchase to disposal. Configuration management helps in monitoring and tracking the configurations and relationships among various IT components. This section discusses the concepts of asset management, configuration management, and change management. Module 08 Page 1116 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Assessment Techniques and Tools Exam 212-82 What is Asset Management? ° Q Asset management is a process of maintaining an organization’s assets such as systems, printers, software or hardware devices, and other spare parts in cost-effective manner, which helps in the growth of the organization and in fulfilling the business goals Q 1t assists the management in tracking all the information about tangibles and intangibles involved in business development Asset Management................................... A v' Financial assets v’ Systems v' Reputation v Land v v Building Human capital v Intellectual property v' Other physical assets Copyright © by EC-( cil. All Rights Reserved. ReproductionIs Strictly Prohibited. What is Asset Management? Asset management is a process of monitoring and managing an organization’s assets such as systems, printers, software or hardware devices, and other devices in a cost-effective manner, which helps in the growth of the organization and in fulfilling the overall business goals. The asset management process involves the tracking and handling of all aspects ranging from procurement to the detachment of the assets from service. It helps in maintaining asset information such as asset name, model number, asset type, asset ID, location of the asset, and owner of the asset in the asset management database. It assists the management in tracking all the information property, and about human tangibles capital) (such and as financial intangibles (such assets, company as systems, reputation, land, building, intellectual and other physical assets) involved in business development, performing financials audits, and maintaining inventory. This process makes it easier to improve visibility, optimize usage, and analyze the assets to make any changes required in the future. Module 08 Page 1117 Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Assessment Techniques and Tools Exam 212-82 Asset Identification Methods Standard Naming Conventions O A standard naming convention of assets is used to identify each asset individually with a unique name assigned to it O Example: barcode or RFID tag with a unique number/name Internet Protocol (IP) Schema O It stores the subnet information of an IP address space and the range of IPs used in each subnet Copyright © by All Rights Reserved. Reproductionis Strictly Prohibited Asset Identification Methods It is important to have an asset management procedure in every organization to track the availability of assets, condition of assets, maintenance time, replacement cost of assets, and location of assets; asset management also prevents assets from unknown modifications and theft. The following methods can be used to identify the assets related to an organization. = Standard Naming Conventions A standard naming convention of unique name assigned to it. Based RFID tag, which contains a unique database. To identify each asset assets is used to identify an asset individually with a on convenience, every asset is provided a barcode or number/name and is stored in the asset management separately, these identification tags are attached to various assets such as hardware devices, accounts, and virtual machines as well as to non-functional resources such as tables and furniture. Organizations follow some standard rules for assigning a name that consists of multiple attributes describing the type of asset, operation of the asset, number of assets, and even the location of the asset in some cases. = Internet Protocol (IP) Schema An IP schema stores the subnet information of an IP address space and the range of IPs used in each subnet. If an organization consists of multiple departments with several systems in a single IP address space, it is necessary to subdivide the network into parts, which are called subnets. An IP schema helps the administrator in managing the subnets and applying ACLs specific to that subnet; it also facilitates the monitoring of the systems for security. Administrators use IP address management software to manage the IP address usage in a subnet. This software provides the list of available IP addresses in the address pool. Module 08 Page 1118 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Assessment Techniques and Tools Exam 212-82 Asset Management Tools It provides deep insights into IT, software, and cloud assets. It optimizes IT operations and supports xAssets [P — :;eshsenncetl'; Afs::t customized reporting Y Y T ———— h,,;fl;ffi’,?,fk“mf are 0090 ITAM 00 NinjaRMM https://www.ninjormm.com ManageEngine AssetExplorer https://www.monogeengine.com Spiceworks IT Asset Management Software https://www.spiceworks.com Asset Panda https.//www.assetponde.com https//www xassets.com ey ot o Asset Management Tools Asset management solutions are centralized databases or systems used to monitor and record all the services as well as physical and non-physical assets serving the business. These centralized systems enable the management to view the location, functionality, and condition of assets. = xAssets ITAM Source: https://www.xassets.com xAssets ITAM provides deep insights into IT, software, and cloud assets. It optimizes IT operations and supports customized reporting. Furthermore, asset reuse, software optimization, and efficiency improvement. Module 08 Page 1119 it saves expenditure on Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Assessment Techniques and Tools R T B T T T e Exam 212-82 i IR - X0 Figure 8.19: Screenshot of xAssets ITAM The following are some additional asset management tools: Freshservice IT Asset Management Software (https.//freshservice.com) NinjaRMM (https://www.ninjarmm.com) ManageEngine AssetExplorer (https://www.manageengine.com) Spiceworks IT Asset Management Software (https.//www.spiceworks.com) Asset Panda (https.//www.assetpanda.com) Module 08 Page 1120 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.