O'Reilly logo

CISSP Exam Cram™ 2 by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Operations Security

Terms you'll need to understand:

  • Phreakers

  • Denial of service

  • Least privilege

  • Penetration testing

  • War driving

  • Traffic analysis

Techniques you'll need to master:

  • Identifying attack methodologies

  • Understanding backup and recovery

  • Implementing operational security

  • Auditing and monitoring

Introduction

The operations security domain addresses the day-to-day activities that are needed to keep things running and operating securely. This domain introduces you to concepts that apply to daily activities such as how to respond to attacks, how to ensure good administrative management and control, how to handle violations, and how to establish a threshold to determine what a notable violation is. Violations to operational security aren't always ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required