Security Issue Analysis Paper

Great Essays
1. Purpose
After several security incidents Greiblock Credit Union (GCU) Board of Directors needs a sound policy to address the situation. The main objective of this document is to improve the security culture of the organization. The specifications of this policy will address dynamic vulnerability analysis, intrusion detection, and incident response. This document goes into detail about what is required for a proper incidence response.
2. Scope
This policy is intended to support the protection of information systems in GCU and will cover all data within the GCU infrastructure:
• Data at rest stored in databases across 100 branch offices located throughout the Midwest
• Data in transit and data stored on computers
• All forms of communication
…show more content…
Intrusion detection systems can still be useful even with the advent false positives as long as the system is tuned properly.
As an employment principle, each IDS sensor will be tuned one at a time in order to control the amount of alerts as the system is introduced to the network. The network and systems team must be consulted so that the introduction of the system does not cause an interruption in service based on their use of the system. This will assist in stopping false positives due to timed processes and system updates.

3
All system alerts should be routed directly to the Computer Security Incident Response Team (CSIRT) utilizing a log and alert system that works with the IDS to group incidents as they relate and allow the CSIRT to identify patterns and trends. These logs must be reviewed on a regular basis and audited as part of a routine for the CSIRT (www.networkcomputing.com).
3.3. Incident Response
This is the specific approach that GCU will take in the occurrence of a security breach or a cyber attack. Following these steps will minimize exposure area, reduce costs, down time and damage to the business interests.
3.3.1.
…show more content…
Lessons Learned
It is vital that the organization captures lessons learned in order to prevent such an incident from happening again.
• Update all policies to ensure the incident doesn’t happen again
• Check for flaws or shortcomings in user knowledge or policy that may have been a contribution to the incident
• Validate the success and/or failure of the response plan against the incident
• Validate the contact roster
• Maintain the information captured by the CSIRT during the identification process
4. Enforcement
Managers have the sole task of enforcement for this policy under the governance of law and policies for specific business processes.
5. Metrics
Incident Response Metrics allows IT staff to clearly define the landscape of cyber security to senior management. This will help in guiding improvements in the process and assist IT staff in gaining funding for improvement in the Incident Response process. IR Metrics are fact based analysis that give visual depictions in a graphical manner of trends of incidents, reaction time and process success to managers to assist in the decision making process (seanmason.com).

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    • Malicious process monitoring: We could make use of a tool like a windows registry accesses which helps tracks all the malicious programs trying to access the system. Such a tool on the dashboard greatly benefits the user since they can try keep the system safe without any external threats entering the system without notifying the user. The real time updating of the tool in this case will be easier because the user needs to only notified of programs that require them to look at the program as fast as they can. o Requires attention: The sub-point inside this metric could be a metric that can be called Requires Immediate attention. Not all the malicious software trying to access the system are of level 10 danger.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Escalation Policy Pathways Industries Policy Overview This policy provides guidelines for responding to misuse of Pathways Industries IT and network resources either from internal or external sources. This policy will attempt to provide contact information for reporting incidents and when to involve Pathways Industries Executive Team, and or company legal representatives. Attacks on Pathways Industries resources could be considered as theft of intellectual property or other computer network attack. All staff members will receive regular training on acceptable use and incident handling procedures of all Pathways Industries resources.…

    • 738 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    The security policies should outline what employees are expected of in regards to complying with the security policies and the consequences…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “Threat assessments are important decision support tools that can assist organizations in…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf NIST - National Institute of Standards and Technology. (2012, September). Special Publication 800-30 REV 1: Guide for Conducting Risk Assessments.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Decent Essays

    It should be said that the Incident Command System (ICS) has its own functional structure. This structure can be divided by five key functional areas. These areas require a specific focus to learn their actual responsibilities and mechanisms of action. As it was mentioned, the ICS incorporates five core functional areas which are responsible for certain roles and responsibilities in context of emergency management.…

    • 281 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    It is important to remember that protecting the homeland from terrorism is extremely expensive and time sensitive. That is all the more reason to comprehend the importance of the risk management formula. Moreover, it’s crucial to assess the threats and the vulnerabilities of the targets in order to determine which target and threat is more important at the…

    • 1238 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Implementation of policy Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity, and availability of sensitive information, including protected health information (PHI). These measures must ensure that access to sensitive information is restricted to authorized users…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays