Security Operations

In this chapter, you will learn about

•  Data classifications such as Confidential, Sensitive, Private, and Public

•  The difference between data at rest and data in motion

•  Different elements of data management policies

•  Components of a database such as tuples, rows, primary keys, and foreign keys

•  Risks related to data inference, data diddling, and Big Data

•  Regulatory requirements related to PII and PHI

•  Asset management components

•  The differences between certification and accreditation

•  The Common Criteria and its evaluation levels

•  Using a risk management framework with a certification and accreditation process

•  Different phases of a system development life cycle

Handling Data

Data is one ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.