Operations Security
AGENDA
- Operations necessary to protect and control information processing assets
- Identify the security services available
- Process and techniques that can be implemented to keep the system operational when faced with threats
- Privileged entity controls
- Resource protection
- Continuity of operations
- Change control management