Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Describe how you do or could use operations security in your current job. If you

ID: 3904290 • Letter: D

Question

Describe how you do or could use operations security in your current job.

If you are currently unemployed or in a job in which you are not able to apply the class concepts, define the job you are looking to apply for and how you would use operation security in that job position.

Also, be sure to provide references to the best practices you learned in this class. For example, you can reference the textbook, find additional resources online and in the library. Remember, you want to provide support for your key points by pointing readers to the best practices in operations security.  

Length: at least 600-800 words.

Explanation / Answer

Answer)

Operational security is a risk management system where the security of the operations have to be done and managed to protect sensitive data and also such that the data does not fall or gets used by somebody who is not authorized to do so. Operations security are prevalent both in public and private sector and also in many cases are relevant to the personal life of people. My current job is as a software developer. There are many operations security in my current job that are applied by the company policies and are undertaken by the company. There are generally some steps in which you can used the operation security in a job position such as:

a) Identify the sensitive data - The sensitive data in an organization has to be identified and thus protected with relevant protection rules, access control and encryption to be implemented. Sensitive data such as company confidential information, customer information, employee information etc.

b) Identifying the possible threats to the sensitive data is another major task as you have to be aware of the third parties and whoever is a challenge and is trying to the hands on your sensitive data.

c) Analyzing the security issues and other vulnerabilities in the system and implementing safeguards against them.

d) Ranking the vulnerabilities and analyze the risk level of the vulnerabilities and risks associated with each vulnerability. Thus we can assume what vulnerability may occur more than something else and also how to handle these.

e) Getting the safeguards against the risks and vulnerabilities in place against the risks associated with the data theft and attacks and other risks which threaten the confidentiality of the information. Train security professionals handling the company security and inform them about the vulnerabilities and other risks that may occur and decide on the action they can perform.