Domain 7 – Security Operations/Operations Management and Physical Security

After reading this week’s materials, please respond to one or more of the following questions.

  1. Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?
  2. Define the different types of trusted recovery. What is meant by the term “fail secure”?
  3. What is Change Management and how is it used to control security breaches? What is Configuration Management and how is it used to control security breaches? What is Patch management and how is it used to control security breaches?

 

Domain 7 – Security Operations/Disaster Recovery and Redundancy

Must post first.

After reading this week’s materials, please respond to one or more of the following questions.

  1. Compare mean time between repair (MTTR) and mean time between failures (MTBF). Why can more components actually mean less reliability?
  2. Define the full, incremental, and differential backups and describe the differences between these data backup types.
  3. Describe the differences between disk shadowing, electronic vaulting, and remote journaling. What is disk duplexing and how does it differ from disk mirroring?
  4. Describe the different methods of RAID. What is MAID? What is RAIT?