Computer Science
UC Security Strategies in Windows Platforms & Applications Discussion

University of the Cumberlands

Question Description

I need support with this Computer Science question so I can learn better.

The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability. The project Should include research & analysis on the below:

Write a five to six (5 - 6) page paper in which:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability.
  2. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks.
  3. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization's access control metric.

The assignment must follow these formatting requirements:

  • Use at least six - seven (6 - 7 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are NOT included in the required assignment page length.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Running head: OPERATION SECURITY RESEARCH PROJECT

Operation Security Research Project
Institution Affiliation
Date

1

OPERATION SECURITY RESEARCH PROJECT

2

Abstract
This paper will compare and contrast access control in relations to risk threat and
vulnerability. It will also research and discuss how different auditing and monitoring techniques
are used to identify & protect the system against network attacks. Thirdly it will explain the
relationship between access control and its impact on the Criminal Investigation Agency. Next, it
will describe access control and its level of importance within operations security within an
organization. It will also Argue the need for organizations to implement access controls in relations
to maintaining confidentiality, integrity and availability, for example, asking whether it is a risky
practice to store customer information for repeat visits. Lastly, it will Describe the necessary
components within an organization's access control metric.

OPERATION SECURITY RESEARCH PROJECT

3

Introduction
Organizations in the 21st century need to have a strategy on how to go about its security in
terms of information and data. Most of these organizations today have converted to using
technological means, and this depicts that everything should be digital. Technology is a very vital
aspect of the success of a company today, but its security should be on another level. With this
said, one of the most important levels of management is that of the operational level. Operational
security, therefore, is vital in an organization because it ensures that everything that is done at the
operational level is safe. Technology, as we have discovered, is key in the learning of all the
operations of an organization, and it means that it should also be protected too with the aim of
preventing massive losses.
Compare & Contrast Access Control in Relations to Risk, Threat and Vulnerability
To begin with risk, it refers to the expression of future loopholes in regard to the deviation
of some of the steps or measures that had been installed in the past. In regard to access control, the
risk would be known with the cutting of prices as one of the measures to protect the customers.
However, the cutting or reducing of these prices would, on the o...

nkostas (31617)
UT Austin

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Anonymous
Thank you! Reasonably priced given the quality

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags