asset & security management chapter 9. it asset management (itam) is the process of tracking...

24
Asset & Security Management Chapter 9

Upload: ashley-short

Post on 28-Dec-2015

233 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Asset & Security Management

Chapter 9

Page 2: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

IT Asset Management (ITAM)

• Is the process of tracking information about technology assets through the entire asset life cycle, from initial ordering or purchase to retirement and disposal.

• Asset management provides IT department with the information to efficiently manage and leverage assets for increased productivity and reduced cost of ownership.

Page 3: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Assets include…

• Hardware• Software• Proprietary data• Backups and archives• Manuals, guides and books• Printouts• Audit records• Distribution media for licensed software• Warranties and maintenance records.

Page 4: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Organisational benefits…

• Helpdesk can view configurations, service history & track problems

• Facilities manager know where the assets are located

• Service manager has easy access to warranty and maintenance records

• Network manager sees network configuration in detail

• Accounting has value of assets & tracks technology investment

Page 5: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Organisational benefits…

• Purchasing manager views costs and orders across the organisation

• Financial manager can view the entire inventory and determine how to get the best return on technology investment

• System manager can see lease and maintenance status and can efficiently plan upgrades

• Software manager can view licensing information• IT manager can discover ways of optimising IT

resources across the organisation

Page 6: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Challenges…

• Constant change• Non-standard environment• Mobile devices

Page 7: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Collecting information…

• First step is to compile an inventory of all technology assets

– Auto discovery tools gather data about technology assets via the network

Page 8: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Asset tracking information

– User contact information– Hardware configuration– System software configuration– Serial number– Warranty information– Network wall jack and port numbers– Physical location– Asset identification tag umbers– Troubleshooting and service histories

Page 9: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Helpdesk benefit

• Availability of configuration Information• Accuracy of information• Prevention of widespread problems• Remote diagnosis of problems• Detection of unauthorised software• Tracking of software usage• Determination of Total cost of ownership• Implementation of Change Requests• Tracking of warranty and maintenance information

Page 10: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Question

• Is an asset management system a replacement for an existing helpdesk information system?

Page 11: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Computer Security

Page 12: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Computer Security

• Is the process of planning, implementing and verifying the protection of an organisation's computer-related assets from internal and external threats.

Page 13: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Measures

• Passwords, locks, file protections and encryption to keep intruders out

• Log files and system alerts to warn of unauthorised entry

• Backups, uninterruptable power supplies and mirrored disk images to repair or replace items after damage

• Security policies to handle violations that do occur

Page 14: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Physical security

• Protection of building sites & equipment from theft, vandalism, natural disasters, manmade catastrophes and accidental damage.

Page 15: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Security Threats

• Natural disaster• Utility outage• Hackers• Viruses• Theft of assets• Political terrorism• Subversive employees or contractors• System configuration changes• Bugs in software

Page 16: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Security Process

• Stages1. Identifying assets2. Assessing risk3. Preparing4. Monitoring5. Responding

Page 17: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

1. Identifying Assets

• Before assets can be protected, they must be identified.

Page 18: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

2. Assessing security needs & risks

• Determine the risk level of the organisations technology assets– Physical security– Computer/data centre – Data security– Data classification– Data access privileges– Social engineering

Page 19: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

3. Preparing for Security Violations

• A well written, comprehensive security policy is the foundation for a secure computing environment.

• Must state– Purpose– Scope– Terms– Rights of users– Delegate responsibilities & action– Reference related documents

Page 20: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Example

Information Security Policy

• http://www.it.ox.ac.uk/policies-and-guidelines/information-security-policy

Page 21: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

4. Monitoring

• An intrusion detection system (IDS) e.g., a sniffer, inspects all inbound & outbound network activity & identifies suspicious activity

Page 22: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

5. Responding to Incidents

• Incidents will occur• Incident handling demands the ability to

quickly and efficiently react to disruptions • There should be a written procedure to be

followed in the event of a violation or attack• A disaster recovery plan must be in place and

practiced

Page 23: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Backups

• The activity of copying files to another medium so that they will be preserved in case the originals are no longer available.

Page 24: Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset

Backup Methods

• Full backup – All files are backed up. Most complete and most time consuming.

• Incremental – Only files that have changed since the last backup are backed up. Least time consuming to backup but most time consuming to restore.

• Differential – Only files that have changed since the last full backup are backed up.

• Daily copy – Only files that were changed on that day are backed up

• Copy – Backing up of only selected files.