Host Based Security System Case Study

Improved Essays
Mr. Todd Finney led his team of Host Based Security System (HBSS) administrators through a successful Command Cyber Readiness Inspection (CCRI). Thanks to Mr. Finney’s superb leadership, guidance, organizational skills, and technical abilities, he was able to take on the challenge of bringing up the overall compliance score of less than 50% to an exceptional score of 85.6%. This score ranked amongst the top 3% in the Army. Mr. Finney’s team addressed HBSS-related security vulnerabilities on over 19,000 workstations and 1,400 servers across the Recruiter Services Network. Mr. Finney’s ability to dissect, assess, remediate, and document each of the HBSS Security Technical Implementation Guides and Computer Network Defense Directives equated

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Developed in collaboration with healthcare and information security professionals, the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a security framework for protecting health information tailored for the U.S. healthcare industry. The CSF includes and integrates federal and state regulations, standards, and frameworks such as HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), and COBIT (Control Objectives for Information and related Technology) to provide a healthcare organization with a broad and adaptable tool for assessing risk (Murphy, 2015). As described on the Health Information Trust…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Dave Woofter Case Study

    • 272 Words
    • 2 Pages

    Dave Woofter is recommended for the Commander’s Award for Civilian Service because of his outstanding performance prior to and during the Human Resources Command (HRC), Command Cyber Readiness Inspection (CCRI), from 29 February 2016 to 04 March 2016. Mr. Woofter lead the Network Operations Center which synchronized and communicated all necessary network and system outages during the critical build up and preparation for the Command’s inspection. His work and efforts ensured HRC’s customers, the United States Army Cadet Command, and the United States Army Recruiting Command were aware of pending and proposed system and network changes as well as service interruptions while the Personnel Information Systems Directorate (PERSINSD) conducted…

    • 272 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    One of the problems that remains an issue for fusion centers is although they are good at dispersing information between all levels of law enforcement, there remains a disconnect between the private sector and the fusion centers. In a recent survey conducted with seventy of the seventy-seven fusion centers around the country, 2.1 percent of them admitted that they received daily information from the private sector (Erickson, 2012). Without the private sectors input of information there remains a disconnect of information and this should be addressed as soon as possible. Another problem that persists is the difficulty that fusion centers have when it comes to their ability to “analyze cyber security relevant information (Erickson, 2012).” This could easily be fixed by employing more knowledgeable personnel.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Network Sentry Case

    • 1268 Words
    • 6 Pages

    Network Sentry enables organizations to build a customized “best of breed” security solution. It has 100% visibility, but also ingests and correlates information from multiple sources to increase the fidelity of alerts, accurately triage events, and deliver contextual information along with alerts to streamline remediation. Alternatively, organizations can save money and integrate with existing equipment, then upgrade security technology over time, without being locked into any particular brand. It offers: • Faster resolution to minimize damage. All alerts and contextual information is available in real-time, through one dashboard • Reduces costs.…

    • 1268 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays