Operations Security

AGENDA

  • Operations necessary to protect and control information processing assets
  • Identify the security services available
  • Process and techniques that can be implemented to keep the system operational when faced with threats
  • Privileged entity controls
  • Resource protection
  • Continuity of operations
  • Change control management