O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Operations security

This chapter looks at the daily activities of the operations of an enterprise and identifies where vulnerabilities are often created and exist. One area of vulnerability in the enterprise that has been largely absent in the preceding chapters is that of availability. Almost all other chapters primarily address the vulnerabilities and protections of the confidentiality and integrity of the valuable information assets. This domain still handles those issues but also discusses availability to complete the confidentiality, integrity, and availability (CIA) triad. This chapter also looks at the potential countermeasures that are commonly implemented to reduce the risks inherent in the daily operations of the enterprise. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required