IT Examiner School, Seaside, CA
Privileged/Admin Access
• “Skeleton Key”- all access key • Access to key functions such as add, delete, and change. • Control over employee rights and permissible activities. • Access to key controls such as auditing, logging, etc. that would record a cyber event • Permit “root” access which allows them to change operating system controls.
VOIP
• Physical / Logical controls • Patch management/ operating system updates • Network segmentation • Security testing
Made with FlippingBook - Online catalogs