Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Operation Management Expert

Now we are ready to focus on two areas of security that are very technical: physical security and security operations. While there are many ways to control security that are related to computer science, many agree that if an adversary has physical access to a server or even your wireless access point, then there is little that hardware, software, and communications can do to protect the confidentiality, integrity, or availability of your information assets; the game may be over before it starts. We will look at the primary means to control access to your facility and information assets.

Physical security controls are arguably the first (or outermost) layer in a defense-in-depth strategy. As a result, we will spend some time looking at ways to control physical access to an organization's computing resources, and what to do when we lose physical access control.

Our second topic this week is security operations. This area concerns operating and maintaining a production system and network that remains secure even when it is under attack. It involves knowing what is happening at all times so that your system can be kept in a known good state. Security operations is arguably the last layer in a defense-in-depth strategy. The issues are to prevent, detect, and react to loss of confidentiality, integrity, and availability. To do this effectively, you have to know your vulnerabilities, the nature of the threat, whether you are under attack, what kind of attack you are experiencing, and you must have plans to deal with all of those things. In essence, the job is to maintain readiness. Security operations is, in a sense, where the rubber meets the road.

One area of focus deals with ways to control access to business and personal information. Operations Security, or OPSEC as it is called, is a lot like a puzzle. One may be able to capture and arrange innocent-looking information to build a picture of how you protect your information assets, including how you protect your facilities and your people. It looks at how an adversary might "case the joint" (in bank robber terminology).

Objectives

1. Given an organization requiring physical security, be able to establish physical security guidelines for that organization.

Enablers

Examine the types of physical access controls.

List the layers of common physical access controls.

Discuss defense-in-depth.

Perform a physical security survey.

2. Given an organization requiring operational security, be able to establish operational security guidelines for that organization.

Enablers

Explain the basic principles of security operations.

Explore the relationship of change management to security operations.

Distinguish between security operations and operations security (OPSEC).

List important elements of situation awareness.

Operation Management, Management Studies

  • Category:- Operation Management
  • Reference No.:- M93112091

Have any Question?


Related Questions in Operation Management

Collaborate and discuss think of a conflict situation that

Collaborate and Discuss: Think of a conflict situation that could occur in a healthcare setting and create a scenario. This can involve health care workers or patients. For example, it could be a conflict between workers ...

Recommendations in this section you will recommend the

Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how well each technology meets your business’s technology requirements. A. Reco ...

Household appliances corp produces 3 products lamps

Household Appliances Corp produces 3 products: lamps, lightbulbs, and extension cords. Lamps take 6 minutes of labor to produce, lightbulbs take 3 minutes, and extension cords take 4 minutes. Lamps require 8 electric cab ...

Topiconce you have selected one of following

Topic: Once you have selected one of following companies(computershare, virgin Australia, billabong, foster's group, bluescope), you are required to undertake and produce a strategic report that addresses the following t ...

Leaders today must be able to create a compelling vision

Leaders today must be able to create a compelling vision for the organization. They also must be able to create an aligned strategy and then execute it. Visions have two parts, the envisioned future and the core values t ...

Tim erven founded custom gaming in 2008 when he was 18

Tim Erven founded Custom Gaming in 2008 when he was 18 years old. Over the next five years, the company grew to become the leader in rapid-fire controllers for serious gamers. Custom Gaming was not Erven’s first entrepre ...

1 the forecast at period t was calculated at 502 unit sales

1. The forecast at period t was calculated at 502 unit sales. The actual sales for period t were 547 units. What is the forecast error? 2. In today's society, do you feel your freedoms, property and equality rights have ...

This september the white house launched the ldquoitrsquos

This September, The White House launched the “It’s on Us” campaign to prevent sexual assaults on college campuses as it is an increasing concern that requires everyone’s participation to prevent such violence. The Presid ...

1 the history of marketing is replete with examples of how

1. The history of marketing is replete with examples of how the practice of marketing management (and thus strategy) has incorporated new and different ways of thinking about marketing. Looking at the evidence presented ...

1 what were the reasons for walmart shifting its focus to

1. What were the reasons for Walmart shifting its focus to Africa? 2. Do you think Africa offers good growth prospects for WalMart in the future? 3. Why did Wal-Mart face opposition from trade unions and other government ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As