Establish operational security guidelines for organization

Assignment Help Operation Management
Reference no: EM132124625

Now we are ready to focus on two areas of security that are very technical: physical security and security operations. While there are many ways to control security that are related to computer science, many agree that if an adversary has physical access to a server or even your wireless access point, then there is little that hardware, software, and communications can do to protect the confidentiality, integrity, or availability of your information assets; the game may be over before it starts. We will look at the primary means to control access to your facility and information assets.

Physical security controls are arguably the first (or outermost) layer in a defense-in-depth strategy. As a result, we will spend some time looking at ways to control physical access to an organization's computing resources, and what to do when we lose physical access control.

Our second topic this week is security operations. This area concerns operating and maintaining a production system and network that remains secure even when it is under attack. It involves knowing what is happening at all times so that your system can be kept in a known good state. Security operations is arguably the last layer in a defense-in-depth strategy. The issues are to prevent, detect, and react to loss of confidentiality, integrity, and availability. To do this effectively, you have to know your vulnerabilities, the nature of the threat, whether you are under attack, what kind of attack you are experiencing, and you must have plans to deal with all of those things. In essence, the job is to maintain readiness. Security operations is, in a sense, where the rubber meets the road.

One area of focus deals with ways to control access to business and personal information. Operations Security, or OPSEC as it is called, is a lot like a puzzle. One may be able to capture and arrange innocent-looking information to build a picture of how you protect your information assets, including how you protect your facilities and your people. It looks at how an adversary might "case the joint" (in bank robber terminology).

Objectives

1. Given an organization requiring physical security, be able to establish physical security guidelines for that organization.

Enablers

Examine the types of physical access controls.

List the layers of common physical access controls.

Discuss defense-in-depth.

Perform a physical security survey.

2. Given an organization requiring operational security, be able to establish operational security guidelines for that organization.

Enablers

Explain the basic principles of security operations.

Explore the relationship of change management to security operations.

Distinguish between security operations and operations security (OPSEC).

List important elements of situation awareness.

Reference no: EM132124625

Questions Cloud

Development-production and sale of electric vehicles : The articles of the company state the company is for the development, production and sale of electric vehicles.
Selling yourself and your ideas to senior management : Material, "Selling Yourself and Your Ideas to Senior Management," there are tips about making effective presentations geared to your audience.
Describe active data warehousing : Describe “active” data warehousing as it is applied at Continental Airlines.
What are strong and weak sustainability : What are the essential aspects of sustainability as defined in the Brundtland Report? What are strong and weak sustainability?
Establish operational security guidelines for organization : Given an organization requiring operational security, be able to establish operational security guidelines for that organization.
Evaluating the effectiveness of the implemented : Why is it important to use both together in evaluating the effectiveness of the implemented solution?
Cost of customizing is worth value provided to consumers : Find a company and describe whether the cost of customizing is worth the value provided to consumers.
Leadership communication in an organizational context : Leadership Communication in an Organizational Context
Quantitative data can be collected from qualitative works : Different issues and information which are not obtained by quantitative data can be collected from qualitative works.

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd