Chapter 10. Operations security

This chapter looks at the daily activities of the operations of an enterprise and identifies where vulnerabilities are often created and exist. One area of vulnerability in the enterprise that has been largely absent in the preceding chapters is that of availability. Almost all other chapters primarily address the vulnerabilities and protections of the confidentiality and integrity of the valuable information assets. This domain still handles those issues but also discusses availability to complete the confidentiality, integrity, and availability (CIA) triad. This chapter also looks at the potential countermeasures that are commonly implemented to reduce the risks inherent in the daily operations of the enterprise. ...

Get CISSP Training Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.