Chapter summary

  • The roles of people in the operations department are data owner, manager, custodian, and user. Operations is typically responsible for system installation and maintenance, configuration management, system availability, data management, user provisioning, fraud protection and detection, vulnerability assessment, and assistance during incident response.Data classification, labeling, and handling instructions are provided in the policy documents of the enterprise.

  • Single points of failure must be identified and eliminated where possible by using fault-tolerant and redundancy techniques. Fault tolerance allows for one component failure while all related data and services remain available. Redundancy provides two or more components or ...

Get CISSP Training Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.