SlideShare a Scribd company logo
Operations security - PPT should cover below questions
(chapter 1 to 6)
Compare & Contrast access control in relations to risk, threat
and vulnerability.
Research and discuss how different auditing and monitoring
techniques are used to identify & protect the system against
network attacks.
Explain the relationship between access control and its impact
on CIA (maintaining network confidentiality, integrity and
availability).
Describe access control and its level of importance within
operations security.
Argue the need for organizations to implement access controls
in relations to maintaining confidentiality, integrity and
availability (e.g., Is it a risky practice to store customer
information for repeat visits?)
Describe the necessary components within an organization's
access control metric.
Power Point Presentation
7 - 10 slides total (
does not include title or summary slide
)
Try using the 6×6 rule to keep your content concise and clean
looking. The 6×6 rule means a maximum of six bullet points per
slide and six words per bullet point
Keep the colors simple
Use charts where applicable
Use notes section of slide
Include transitions
Include use of graphics / animations

More Related Content

PPTX
chp unit 1 Provide Network System Administration.pptx
PPTX
providenetworksystemadministration.pptxhnnhgcbdjckk
PPTX
Chapter 3 security part i auditing operating systems and networks
PPT
Security Operations -- An Overview
PPTX
Chapter 3 security part i auditing operating systems and networks
DOCX
2018-FALL-MAIN-ISOL534-22-23-COMBINED - 2018_FALL_MAIN_APPLICA.docx
PPTX
Attacker scenarios and threats description.pptx
PPTX
operation security
chp unit 1 Provide Network System Administration.pptx
providenetworksystemadministration.pptxhnnhgcbdjckk
Chapter 3 security part i auditing operating systems and networks
Security Operations -- An Overview
Chapter 3 security part i auditing operating systems and networks
2018-FALL-MAIN-ISOL534-22-23-COMBINED - 2018_FALL_MAIN_APPLICA.docx
Attacker scenarios and threats description.pptx
operation security

Similar to Operations security - PPT should cover below questions (chapter 1 to.docx (20)

PPTX
How To Secure MIS
PPSX
4 Operations Security
PDF
Operations Security Presentation
PDF
Certified Information Systems Security Professional (cissp) Domain “access co...
DOCX
E sec chaptr-1
PDF
Understanding security operation.pptx
PPTX
crisc_wk_5.pptx
PDF
information security introduction for campus students.pdf
PDF
Mis presentation by suraj vaidya
PPT
Information Technology Security A Brief Overview 2001
DOCX
DIRECTIONSRate each statement by how well the behavior describe.docx
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PPTX
Management Information System Presentation
PPT
InfoSecConcepts.ppt
PPTX
Information System Security
PDF
Audit Controls Paper
PPT
Operations_Security - Richard Mosher
PPTX
Web Security Overview
PPT
Main Menu
PPT
Cobit 2
How To Secure MIS
4 Operations Security
Operations Security Presentation
Certified Information Systems Security Professional (cissp) Domain “access co...
E sec chaptr-1
Understanding security operation.pptx
crisc_wk_5.pptx
information security introduction for campus students.pdf
Mis presentation by suraj vaidya
Information Technology Security A Brief Overview 2001
DIRECTIONSRate each statement by how well the behavior describe.docx
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Management Information System Presentation
InfoSecConcepts.ppt
Information System Security
Audit Controls Paper
Operations_Security - Richard Mosher
Web Security Overview
Main Menu
Cobit 2

More from mccormicknadine86 (20)

DOCX
Option #2Researching a Leader Complete preliminary rese.docx
DOCX
Option 1 ImperialismThe exploitation of  colonial resources.docx
DOCX
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
DOCX
Option A Land SharkWhen is a shark just a shark Consider the.docx
DOCX
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
DOCX
OPTION 2 Can we make the changes we need to make After the pandemi.docx
DOCX
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
DOCX
Option A Description of Dance StylesSelect two styles of danc.docx
DOCX
Option #2Provide several slides that explain the key section.docx
DOCX
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
DOCX
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
DOCX
Option #1 Stanford University Prison Experiment Causality, C.docx
DOCX
Option A  Gender CrimesCriminal acts occur against individu.docx
DOCX
opic 4 Discussion Question 1 May students express religious bel.docx
DOCX
Option 1Choose a philosopher who interests you. Research that p.docx
DOCX
Option #1The Stanford University Prison Experiment Structu.docx
DOCX
Operationaland Organizational SecurityChapter 3Princ.docx
DOCX
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
DOCX
onsider whether you think means-tested programs, such as the Tem.docx
DOCX
Operations Management MGT 320 – Spring 2020Additional As.docx
Option #2Researching a Leader Complete preliminary rese.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option A Description of Dance StylesSelect two styles of danc.docx
Option #2Provide several slides that explain the key section.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
Option A  Gender CrimesCriminal acts occur against individu.docx
opic 4 Discussion Question 1 May students express religious bel.docx
Option 1Choose a philosopher who interests you. Research that p.docx
Option #1The Stanford University Prison Experiment Structu.docx
Operationaland Organizational SecurityChapter 3Princ.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
onsider whether you think means-tested programs, such as the Tem.docx
Operations Management MGT 320 – Spring 2020Additional As.docx

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Classroom Observation Tools for Teachers
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
01-Introduction-to-Information-Management.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
TR - Agricultural Crops Production NC III.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Classroom Observation Tools for Teachers
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Microbial disease of the cardiovascular and lymphatic systems
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Supply Chain Operations Speaking Notes -ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
01-Introduction-to-Information-Management.pdf
O7-L3 Supply Chain Operations - ICLT Program
O5-L3 Freight Transport Ops (International) V1.pdf

Operations security - PPT should cover below questions (chapter 1 to.docx

  • 1. Operations security - PPT should cover below questions (chapter 1 to 6) Compare & Contrast access control in relations to risk, threat and vulnerability. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability). Describe access control and its level of importance within operations security. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?) Describe the necessary components within an organization's access control metric. Power Point Presentation 7 - 10 slides total ( does not include title or summary slide ) Try using the 6×6 rule to keep your content concise and clean
  • 2. looking. The 6×6 rule means a maximum of six bullet points per slide and six words per bullet point Keep the colors simple Use charts where applicable Use notes section of slide Include transitions Include use of graphics / animations