Professional Documents
Culture Documents
2
Module 6 - Operations Security
Operations Security Facility Backups – Cold Site
Administrator Access Other Offsite Approaches
Operational Assurance Priorities
Some Threats to Computer Operations OWASP Top Ten (2013)
Specific Operations Tasks Common Gateway Interface
Data Leakage – Object Reuse How CGI Scripts Work
Object Reuse Cookies
Records Management Virtualization - Type 1
Change Control Virtualization – Type 2
Controlling How Changes Take Place Technologies – Databases and DBMS
Change Control Steps Facilities
Trusted Recovery Facilities Security
Redundant Array of Independent Disks (RAID) Environmental Security
Phases of Plan Physical Access Issues and Exposures
BCP Risk Analysis Physical Access Issues and Exposures
Identify Vulnerabilities and Threats Physical Access Controls
Interdependencies Controls for Environmental Exposures
Identifying Functions’ Resources Controls for Environmental Exposures cont.
Calculating MTD Controls for Environmental Exposures cont.
Recovery Point Objective Electrical Problems
Facility Backups – Hot Site Summary
Facility Backups – Warm Site
3
Network Service – DNS
nslookup
IP Addressing
Network Service – NAT
Recommended NAT Addresses
Technologies - SPAM
Filtering and Content Management
Emerging Technologies
Security of Portable Media
Mobile Device Security
LAN Security Issues
Network Infrastructure Security
Client-server Security
Internet Threats and Security
Causes of Internet Attacks
Honeypots and Honeynets
LaBrea Tarpit
Voice-Over IP (VoIP)
Auditing Network Infrastructure Security
IPSec - Network Layer Protection
IPSec
IPSec
SSL/TLS
Wireless Technologies– Access Point
Standards Comparison
Wi-Fi Network Types
Wireless Technologies – Access Point
802.11i – WPA2
Wireless Security Threats
Kismet
Bluetooth
Summary