The CISSP exam covers 10 domains, one of which is operations security. Operations pertains to security management of the network, risk assessment and maintaining a properly protected network environment.
You'll need to know about administrative responsibilities, types of attacks, configuration management and more. Ensure your knowledge of operations by referring to our operations security training resources and testing your knowledge with our CISSP domain practice quiz, written by CISSP All-in-one Exam Guide author Shon Harris.
Configuration management has become an critical process for security professionals looking to maintain network security. In this domain section of the CISSP Study Guide, learn more about the configuration management process and the plethora of configuration management tools available, including how to choose and implement them.
How to create configuration management plans to install DLP
Installing data loss prevention (DLP) products on a network can require a lot of configuration management planning that includes cooperation between many business groups.
In this expert response, security management expert David Mortman explains how to conduct a network architecture review, and discusses what sort of configuration management planning should take place before installing DLP.
How to choose and implement automated configuration management tools
Networking teams take a major step when they decide to place their trust in automated network configuration management tools, so making the right choice of tool and then learning to implement it correctly can be a complicated process. Automated network configuration management tools do limit manual changes (and therefore errors), but human intervention and training are still required.
In this tip, learn about varying automated network configuration management tools, how to decide which tool is right for your organization and how to implement the tools.
Network change and configuration management primer
With network change and configuration management (NCCM), enterprises can standardize the way they implement network change without disturbing existing systems. That often means using NCCM tools to map and archive the entire network and its components.
In this tip you will gain a better understanding of network change and configuration management and receive information on several network change and configuration management tools.
|Administrator Roles and Responsibilities|
Database administrators (DBAs) and network administrators often have overlapping roles. In this domain section of the CISSP Study Guide, learn how to determine appropriate roles for database administrators and network administrators.
What is the role of a network administrator?
What is the difference between a network administrator and a system administrator? Although both jobs must work collaboratively, they have different roles and responsibilities.
In this expert response, learn the job duties of network and system administrators, depending on company organization and size.
The network administrator's survival guide
According to contributor Doug Chick, the one thing that makes a good network administrator a great network administrator is nothing more than attitude.
In this tip, Chick discusses the nine layers of the Open Systems Interconnection (OSI) model and examines how you can survive in your role as a network administrator.
|Types of Network Attacks|
The volume of network attacks is growing every day, in part because of the proliferation of free tools that can be used by anyone who has even a little (or sometimes no) advanced knowledge. In order to keep a network secure, administrators must be able to identity a wide variety of network attacks. This CISSP operations security tutorial identifies some of these different attacks as well as gives advice on how to protect against them.
Preventing SQL injection attacks: A network administrator's perspective
Database administrators should certainly follow best practices to avoid SQL injections, but network administrators can do their part to ward off these attacks as well.
In this tip, learn the role that network administrators should play in preventing SQL injection attacks.
How to protect the network from DoS attacks
In this Ask the Expert Q&A, security threats expert Ed Skoudis discusses the dangers associated with denial-of-service (DoS) attacks that target DNS servers. He reveals how these attacks are conducted and offers advice on how to effectively protect your network from DoS attacks.
Zero-day attack prevention
Zero-day vulnerabilities are a constant concern for enterprises, and defending against these attacks can seem like an impossible task.
In this tip, which focuses on identifying and containing zero-day threats, learn about zero-day vulnerability prevention methods on the network, client, Web and server levels.
About the author
Shon Harris, CISSP, MCSE, is the president of Logical Security, an IT security consulting and training company. She is a former engineer in the Air Force's Information Warfare unit, an instructor and the best-selling author of the previous three editions of this book. Shon has taught computer and information security to a wide range of clients, including RSA, the Department of Defense, the Department of Energy, the National Security Agency and many more.