Operations Security

Table of contents:

Introduction

The operations security domain addresses the day-to-day activities that are needed to keep things running and operating securely. This domain introduces you to concepts that apply to daily activities such as how to respond to attacks, how to ensure good administrative management and control, how to handle violations, and how to establish a threshold to determine what a notable violation is. Violations to operational security aren't always maliciousthings break and accidents happen. Therefore, operational security must also be prepared to deal with these occurrences.

Students preparing for the ISC2 Certified Information Systems Security Professional exam and those reviewing the operational security domain must know what resources should be protected, the principles of good practice, methods to restrict access, the potential abuse of access, what are considered appropriate controls, and how to respond to attacks.

The CISSP Cram Sheet

A Note from Series Editor Ed Tittel

About the Author

Acknowledgments

We Want to Hear from You!

Introduction

Self-Assessment

The CISSP Certification Exam

Physical Security

Security-Management Practices

Access-Control Systems and Methodology

System Architecture and Models

Telecommunications and Network Security

Applications and Systems-Development Security

Operations Security

Business Continuity Planning

Law, Investigations, and Ethics

Cryptography

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2



CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net