O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter summary

  • The roles of people in the operations department are data owner, manager, custodian, and user. Operations is typically responsible for system installation and maintenance, configuration management, system availability, data management, user provisioning, fraud protection and detection, vulnerability assessment, and assistance during incident response.Data classification, labeling, and handling instructions are provided in the policy documents of the enterprise.

  • Single points of failure must be identified and eliminated where possible by using fault-tolerant and redundancy techniques. Fault tolerance allows for one component failure while all related data and services remain available. Redundancy provides two or more components or ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required