Chapter 8. Operations Security
Terms you'll need to understand:
Phreakers
Denial of service
Least privilege
Penetration testing
War driving
Traffic analysis
Techniques you'll need to master:
Identifying attack methodologies
Understanding backup and recovery
Implementing operational security
Auditing and monitoring
Introduction
The operations security domain addresses the day-to-day activities that are needed to keep things running and operating securely. This domain introduces you to concepts that apply to daily activities such as how to respond to attacks, how to ensure good administrative management and control, how to handle violations, and how to establish a threshold to determine what a notable violation is. Violations to operational security aren't always ...
Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.