logo

Operations Security

   

Added on  2022-10-04

4 Pages714 Words391 Views
 | 
 | 
 | 
Running head: OPERATIONS SECURITY
Operations Security
Name of the student:
Name of the university:
Author Note
Operations Security_1

OPERATIONS SECURITY
1
Reflection of how theories, skills and knowledge of “operations security” could
be implemented to the working environment practically:
As an employee hired in any business, I must first understand that the security operations are
the daily aces and the security of the system resources. It indicates that there should be a suitable
framework comprising of adequate policies, guidelines, procedures and standards for the support and
core services of the firm. I must make a continual review of the policies and assure that they are
updated and relevant. Here, the challenging area for the operation staff is to deliver greater
availability. With the help of redundant, clustering and RAID solutions, I can help the business to
reduce the downtime. It is irrespective of the fact that the concerns are the outcomes of malicious
attacks and just a power failure. Also, I must keep in mind that one of the primary areas of the
security operation is the disposal technique and appropriate storage. It is a part of the normal
operation process. Apart from this, the change management, configuration management and system
hardening are various liabilities of the operations also. Again, the activities within core services also
include the testing of penetration, assessments of vulnerabilities and deployment of IPS/IDS
controls. This is to deliver the extra layer of the network assurances.
For the comprehensive program of the operational security, some of the knowledge or skills
learnt in course can be deployed during my professional days. Firstly, one must learn the deployment
of the precise process of change management. This indicates that the staffs can follow as the changes
in the network are performed. Every move must be controlled and logged such that it can be audited
or monitored. Next, I must restrict access to network devices. This is through using the skills of
AAA authentication learnt. I must also urge my management to provide myself with the minimum
access needed to perform my tasks. They must apply the principle of the least privilege. Next, dual
control can be implemented in my company. I should assure that those who will be working on the
Operations Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Value of ICT Certification Issues 2022
|5
|721
|17

Network Design and Configuration
|10
|2070
|28

Action Plan for Business Development
|14
|3077
|35

Deployment of IT Network at Medical Center: Network Infrastructure Report
|23
|4921
|128

Journal Activity 11.
|2
|277
|32

Analysis of Security Risk and Recommendations for Information System
|7
|1453
|23