Examining the Key Roles of Operations Security
Identify the key role of operations security.
Identify resources to be protected.
Identify privileges to be restricted.
Identify available controls and their type.
Describe the OPSEC process.
The first step in fulfilling the promise of operation security is to understand its key role. Operations security starts by identifying
Resources to protect
Privileges to be restricted
Controls necessary to do so
Identify Resources to Be Protected
The first step in any security review is to determine what you need to protect. Some common items in every organization's information systems should be protected, including
Computers, including servers, desktops, and laptops
Routers, switches, and other networking appliances ...
Get CISSP Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.