Week 2 Discussion Context: Firms seek growth. One source of
October 16, 2021
Assignment Details Discussing hypothesis testing may sound like a complicated
October 16, 2021

Course: Operations Security Textbook: Title: Security Policies and Implementation Issues

Course:  Operations Security 

Textbook:  Title: Security Policies and Implementation Issues 

 The course examines controls over personnel, hardware, software, and systems. It also covers possible abuse channels and proper countermeasures.

 Identify the appropriate security measures and controls for creating a more secure workspace, including policy and procedure development and compliance with laws and regulations.

Recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability.

Recognize key reconnaissance attack methods and identify different types of administrative management and media storage control. 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.