Physical and operations security controls

Security controls that pertain to physical and operations are predominantly in the authentication and authorization processes. Unauthorized intrusions are a common threat in this domain. The following sections provide some of the common security threats, vulnerabilities, and countermeasures in this domain.

Threats, vulnerabilities, and countermeasures for physical and operations security

We have seen the concept of threats and vulnerabilities in various security domains in the earlier chapters. Though the threats are predominantly common across most of the security domains, the vulnerabilities they could exploit will vary, and the countermeasures are generally unique. Some of the threats and vulnerabilities ...

Get CISSP in 21 Days - Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.