Operations Management and Operations Security (OPSEC)
This section includes papers of general interest in computer systems operations management, including some older papers from the 1980s that were written with office automation as their focus. Newer items also include OPSEC topics such as preventing data aggregation from open sources and other COINTEL (counterintelligence) techniques.
Some later papers that are on this Web site and even in the CSH4 text originated in simpler form in the work originally printed in these little articles from INTERACT Magazine published by Interex, the International HP Users' Association and in Computing Canada.
Continuity-of-Operations Matrix XLSX
Here's a Continuity-of-Operations Matrix you can use to see WHO can do WHAT with degrees of facility. Helpful in ensuring that you keep track of people & their abilities and are not dependent on a single person for a critical function. Labels are just for illustration -- you have to fill in your own functions and people.
Thoughts on keeping records of our work.
An introduction to information warfare issues for Facilities Management Magazine.
In this white paper, I hope you will find useful information on how physical security can support the security needs of network operations centers (NOCs) and data centers (DCs). In many of my consulting assignments doing enterprise security reviews, I have seen serious physical security problems; I hope that this overview will help fill in some of the missing information. Updated January 2008.
A little piece about creeps who bully employees into paying for junk.
About a hundred pages of an anonymized operational analysis of a government agency in 1989..
Review of the excellent publication Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps by Gene Kim, Paul Love and George Spafford (2008) from the IT Process Institute. This review is an edited compilation of the individual parts I originally published in the Network World Security Strategies newsletter in November 2008.
Early thoughts (1995) on choosing employees.
Written for the MSIA 2.0 program's Seminar 1, Week 6, this commentary, subtitled "I'm a Lumberjack and I'm OK: System Logging," is not a Monty Python skit.
Copyright © 2019 M. E. Kabay. All rights reserved.
The opinions expressed in any of the writings on this Web site represent the authorís opinions and do not necessarily represent the opinions or positions of his employers, associates, colleagues, students, relatives, friends, enemies, cats, dog or plants. Materials copyrighted by M. E. Kabay from this Website may be freely used for non-commercial teaching (i.e., specifically in any courses for academic credit or in free industry training at workshops or within organizations) but may not be re-posted on any Website or used in commercial training (where participants must pay fees for participation in the conference or workshop or where the instructor is paid) without express written permission. Any unauthorized sale of these copyrighted materials will be prosecuted to the full extent of the law.