Domain 7, “Operations Security”
Roles of Operations Security
Operations security can be used to do the following:
Identify resources to be protected.
Identify privileges to be restricted.
Identify available controls and their types.
Resources to Be Protected
Operations security should be designed to protect the following:
Computers, including servers, desktops, and laptops
Routers, switches, and other networking appliances
Printers
Databases, including the database management software and content
Security software and appliances (firewalls, intrusion detection systems, biometric devices, public key infrastructure
Media such as tapes, CD-ROMs, and disks
Personal digital appliances (PDAs), phones, and wireless devices
Modems and other communications devices ...
Get CISSP Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.