ABSTRACT

Operations security identifies the controls over hardware, media, and the operators and administrators with access privileges to these resources. It is the process of safeguarding information assets while the data is resident in the computer, storage media in transit through communication links, or otherwise associated with the data processing environment. Fisher considers operations security to be the heart of information security: it controls the way data is accessed and processed.