Security Operations

In this chapter, you will learn about

•  Data classifications such as Confidential, Sensitive, Private, and Public

•  The difference between data at rest and data in motion

•  Different elements of data management policies

•  Components of a database such as tuples, rows, primary keys, and foreign keys

•  Risks related to data inference, data diddling, and Big Data

•  Regulatory requirements related to PII and PHI

•  Asset management components

•  The differences between certification and accreditation

•  The Common Criteria and its evaluation levels

•  Using a risk management framework with a certification and accreditation process

•  Different phases of a system development life cycle

Handling Data

Data is one ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.