Chapter 3. Security-Management Practices

Terms you'll need to understand:

  • Confidentiality

  • Integrity

  • Availability

  • Threat

  • Vulnerability

  • Public/private data classification

  • Government data classification

  • Risk

  • SLE

  • Residual risk

  • ALE

Techniques you'll need to master:

  • Risk management

  • Qualitative analysis

  • Quantitative analysis

  • Data-classification criteria

  • Security roles

  • Risk calculations

Introduction

This chapter helps the reader prepare for the security-management domain. Security management addresses the identification of the organization's information assets. The security-management domain also introduces some critical documents, such as policies, procedures, and guidelines. These documents are of great importance because they spell out how the organization manages its ...

Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.