O'Reilly logo

CISSP in 21 Days by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Day 10: Operations Security

Today we'll focus on the control environment to preserve the confidentiality, integrity, and availability of information assets from the perspective of administrative management of operations. We'll also review the established concepts in configuration management and their relevance in information security.

At the end of the day, you should be able to:

  • Explain the concepts in administrative controls
  • Understand and explain TCSEC-related concepts
  • Explain the application and relevance of configuration management

Administrative management and control

Information security is effective risk management. One of the primary risk management processes is to identify the risk to information assets. The next process is known ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required