Operational Management Policies

Running head: OPERATIONAL MANAGEMENT POLICIES 1
Operational Management Policies
Student’s Name
Institutional Affiliation
OPERATIONAL MANAGEMENT POLICIES 2
Operational Management Policies
Security is critical for any organization seeking to secure their information from
malicious attacks. Consequently, companies often formulate policies to help mitigate the risks of
such an attack. Operational management policies often guide employees by providing a template
for best practices. In this paper, the researcher will provide a review of the policies that can be
implemented in an organization
Security Policies
Data security
Data security is a major factor to consider when formulating policies to protect against
data breaches in an organization. System Administrators are often faced with the challenge of
ensuring that information systems are protected from unauthorized access. A common practice in
data security is the use of access codes and other forms of restrictions to access important
information systems.
Audit Logging
An administrator should ensure that access logs to the company systems are maintained
for a considerable time to ensure that attacks can be traced back to the initial point of origin.
Breaches can lead to leakage of sensitive information over time as attacks mask their access to
the system. Audit logging would allow the company to view both successful and unsuccessful
logins to a system. The logging information also tracks the credentials used to access a system.
This would help in identifying the source of the breach preventing further leakage of sensitive
information from the system.
Securing Storage Devices
Another policy that can be implemented is encrypting storage devices to prevent
unauthorized access to the information stored in the external drives. Portable media storage
devices are useful data transfer tools but provide an exploitable weakness (Williams, 2016). It is
important to ensure that data transfer using physical storage devices is limited and in cases where
it is unavoidable, the devices should be encrypted with passwords. A removable media policy
would help address the risk of a data breach through removable media
Roles
The ICT support team and the systems administrator are responsible for ensuring that
management and fellow employees in companies and organizations formulate policies for the
protection of sensitive information. The system administrator is the principal person in charge of
ensuring the security of the information system of the company while the management and
security implement the policies proposed by the IT department.
OPERATIONAL MANAGEMENT POLICIES 3
Communications Plan
Communication of policies and best practices in the company should be done as often as
possible to ensure a high level of security is maintained. Memos and emails are often the
preferable means of informing the company employees of required vigilance and security
measures to prevent cybercrime.
Contextual Characteristics: Hospital
The formulation of operational security policies for protection against attacks are often
prompted by the continued increase in cybercrime around the globe. As skills and education as
well as improved hardware capabilities become easily accessible through the internet,
cybercrime also increases. In hospitals, it is important to inform all the employees who interface
with the hospitals information system of the impact of data breaches on the running of the
hospital. Leakage of sensitive patient information could result in legal action against the hospital.
Noncompliance
A policy for noncompliance with the operational security policies would require that
system administrators penalize employees who to do not follow the guidelines of the policies.
Revoking access to the system for a time would ensure that employees adhere to the policies
detailed by the management and ICT system.
OPERATIONAL MANAGEMENT POLICIES 4
Reference
Williams, B. L. (2016). Information Security Policy Development for Compliance: ISO/IEC
27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2. 0, and AUP V5. 0. Auerbach
Publications.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.