Computer Science
University of the Cumberlands Operation Security Research Project Presentation

University of the Cumberlands

Question Description

Help me study for my Computer Science class. I’m stuck and don’t understand.

Please provide a 7-8 slid ppt on below project The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability. Your residency project will include research & analysis on the below:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability.
  2. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks.
  3. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization's access control metric.

Your assignment must follow these formatting requirements:

  • Use at least six - seven (6 - 7 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are NOT included in the required assignment page length.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer





Security of information and data is vital.

Technology has taken over the 21st century.

It determines the success rate of organizations.

Access control is as equally important.

Operation levels fully depend on it.

Its failure can lead to a downfall.

Compare & Contrast Access Control
in Relations to Risk, Threat and

Risk determines future organizational loopholes.

Past measures also plays a key part.

Vulnerability comes with security measures installed.

This is very different from risk.

Threat comes with the unauthorized accesses.

Wrong encoding is a threat example

Difference Between Auditing and
Monitoring Techniques Used in Identifying
and Protecting the Systems


nkostas (31648)
University of Virginia

Top quality work from this tutor! I’ll be back!

Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Thank you! Reasonably priced given the quality

Similar Questions
Related Tags