Operations Security - Operations Security 1 Operations...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Operations Security 1 Operations Security By Devon Jones University of Phoenix – Axia College
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Operations Security 2 Operations Security XYZ Energy is a company that operates throughout the entire United States. With 50 plants, there are two locations that house computer systems and the company’s network. It is important that these computer systems are secure at all times. Threats to these computers could cripple the productivity of the company on a country-wide level. To keep these computer system locations secure, there are a number of tasks that are recommended for XYZ Energy. Firstly, it is important to acknowledge the types of threats that can impact the productivity of the company. These threats include fire/chemical, structural failure, energy, weather, earth movement, biological, and human, which can be the largest threat. Becoming aware of these threat categories is the key to being able to safeguard against them all (Merkow & Breithaupt, 2006). A set of security policies should be implemented that protects essential services such as the computer system rooms for XYZ Energy. Employee education of the security policies is another key step for ensuring a secure computer data center. The policies are only effective if all employees are knowledgeable of them and recognize their importance. Though XYZ Energy has only two locations of computer data centers, employees within its 50 plant locations should be aware of these policies. Physical control over records and company assets is another important step to operations security. Physical control can be simply a deterrent, or a completely preventative measure.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/09/2010 for the course IT 221 1 taught by Professor Conrad during the Spring '10 term at University of Phoenix.

Page1 / 6

Operations Security - Operations Security 1 Operations...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online