The operations security domain addresses the day-to-day activities that are needed to keep things running and operating securely. This domain introduces you to concepts that apply to daily activities such as how to respond to attacks, how to ensure good administrative management and control, how to handle violations, and how to establish a threshold to determine what a notable violation is. Violations to operational security aren't always maliciousthings break and accidents happen. Therefore, operational security must also be prepared to deal with these occurrences.
Students preparing for the ISC2 Certified Information Systems Security Professional exam and those reviewing the operational security domain must know what resources should be protected, the principles of good practice, methods to restrict access, the potential abuse of access, what are considered appropriate controls, and how to respond to attacks.
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2