Read this whole guide offline with no ads, for a low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Need more practice? 300 additional Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 5:  Operational/Organizational Security (Domain 5.0; 15%)

Previous Topic/Section
Getting Ready for Chapter 5 - Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
5.1  Physical Security
Next Topic/Section

5.0  Operational/Organizational Security

This chapter discusses security from the point of the view of the physical organization and the people within it. As you might guess from earlier chapters, the people aspect figures in prominently, whether we’re discussing physical or organizational security.

Additionally, this chapter looks at computer security-related policy-making. What rules should your organization have in place to govern business continuity, handling improper use of the organization’s computing resources, the specification of the privacy/sensitivity level of data, what computer-related administrative activities occur at employee hiring and termination, etc.? These subjects are addressed in greater depth in this chapter.

Because all the security efforts in the world won’t necessarily keep you from ever experiencing a break-in, we look at computer forensics – the process of investigating an attack, often with the goal that evidence will be presented to law enforcement personnel, for prosecution of the attacker.

It also looks at the business issues of threat and risk identification and assessment – a critical step in the business justification of computer security measures. Before you know how much (people, dollars, etc.) you can dedicate to computer security, you need to know the risks you face, and their values. This chapter covers the last official domain in Security+. Your authors have put forth every effort to adhere to RFC 1925413 throughout this work, and particularly so in this chapter as we are forced to interact with the non-technically inclined.


 __________________

413. http://www.faqs.org/rfcs/rfc1925.html

Previous Topic/Section
Getting Ready for Chapter 5 - Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
5.1  Physical Security
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.