CHAPTER 11Security Operations

This chapter presents the following:

• Administrative management responsibilities

• Operations department responsibilities

• Configuration management

• Trusted recovery states

• Redundancy and fault-tolerant systems

• e-mail security

• Threats to operations security

Operations security pertains to everything that takes place to keep networks, computer systems, applications, and environments up and running in a secure and protected manner. It consists of ensuring that people, applications, and servers have the proper access privileges to only the resources they are entitled to and that oversight is implemented via monitoring, auditing, and reporting controls. Operations take place after the network is developed and ...

Get CISSP All-in-One Exam Guide, 6th Edition, 6th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.