Chapter 8. Operations Security

Terms you'll need to understand:

  • Phreakers

  • Denial of service

  • Least privilege

  • Penetration testing

  • War driving

  • Traffic analysis

Techniques you'll need to master:

  • Identifying attack methodologies

  • Understanding backup and recovery

  • Implementing operational security

  • Auditing and monitoring

Introduction

The operations security domain addresses the day-to-day activities that are needed to keep things running and operating securely. This domain introduces you to concepts that apply to daily activities such as how to respond to attacks, how to ensure good administrative management and control, how to handle violations, and how to establish a threshold to determine what a notable violation is. Violations to operational security aren't always ...

Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.