Actions for 'Domain 7 Security Operations/Operations Management and Physical Security'
Must post first.
Subscribe
Hide Description
After reading this week's materials, please respond to one or more of the following questions.
- Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?
- Define the different types of trusted recovery. What is meant by the term âfail secureâ?
- What is Change Management and how is it used to control security breaches? What is Configuration Management and how is it used to control security breaches? What is Patch management and how is it used to control security breaches?
Actions for 'Domain 7 â Security Operations/Investigations and Computer Forensics'
Subscribe
Hide Description
After reading this week's materials, please respond to one or more of the following questions.
- Describe the four types of assessments that an Investigator can perform.
- What are the six phases of the forensic investigation process that lead to a decision and what are the characteristics of each phase?
- Compare the concepts of due care and due diligence when assessing liability. Describe the "why" behind a crime in terms of motive, opportunity, and means.