Case Study: IT Security Plan

Improved Essays
If I will newly hired as IT Security Manager of a medium size business of 400 employees and have 6 personnel in our security department. My company CIO asked about the security plan of company, as a manger of IT company, I need to secure the data of company is my responsibility. Security strategy plan helps to prepare an organization to face any type of unwanted security issues. As a security manager first thing I will do the Identification of threat, assessment of risk and controlling and mitigation actions should be planned, implementation of recovery strategies and continuity planning, and final step is documentation.
I will plan my thoughts in an order
• Establishing security roles and responsibilities
• Training to
…show more content…
Maintaining the security for a network can be challenging task. Hackers often seem to be one step ahead of network users, even those who are following the best security practices. However, securing the network is essential to protecting for privacy, reducing the risk of identity theft, and preventing hackers from steal of important data. Before company reconnect the network can take a security practices for protecting company sensitive information and data by preventing, detecting, and responding to a wide variety of attacks. I will provide more security for our company network by constructing firewalls and regular updating the login and password credentials (Whitman, Mattord, & Green, …show more content…
The goal at this point is to create a method for evaluating the relative risk of each of the listed vulnerabilities. There are many detailed methods for determining accurate and detailed costs of each of the vulnerabilities. Likewise, there are models that can be used to estimate expenses for the variety of controls that can be used to reduce the risk for vulnerability. I will provide the continuity planning procedures; if any incident happens to the data of company the remaining operations no need to stop. It will help to continuing the operations (Whitman, Mattord, & Green, n.d.).
Recovery strategies and crisis management: As a manger I will use the mitigation control and recovery strategies for an incident. The mitigation is used to reduce the impact caused by the exploitation of vulnerability through planning and preparation. In this includes the business continuity planning. Acceptance is the other strategies to protect the information assets and to accept the outcome of its potential exploitation.
Implementation of security

Related Documents

  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Risk: Disaster takes place that affects the access to PCBB or Silverlake Mitigation Strategies: A. Board approved Business Continuity Plan is in place B. Appropriate processes and controls exist to manage and protect…

    • 1287 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    INFO 290: Final Exam

    • 1200 Words
    • 5 Pages

    Disasters cannot always be avoided. However with creating recovery plans the outcomes of a disaster can be minimized. A Disaster recovery plan lowers the downtime and potential data loss for businesses and individuals that have them. First it protects the organization if computer services become unusable. Additionally, the plan minimizes the disturbances of the business and gives some level of stability and an order after or during a disaster.…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    As the DHS keeps on asserting itself as an effective department for hazard protection, it would need to overcome the problem of the alpha male notion to make it work effective. This follows the fact that each agency under the DHS wants to prove superior to the others and thus resulting into wolf packs. The alpha males might display instances of fighting once a rival wolf crosses their path since each agency wants to be a leader rather than a pack member. As a result, the inner fighting between agencies leads to information sharing and cooperation problems.…

    • 820 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Ultimately, an organization would implement a suite of plans to effectively and efficiently prepare response, recovery, and continuity activities for events causing disruptions in system and business processes. Since disaster recovery has an inherit relationship with business continuity, there must be a coordination between each plan during development, updates, and testing to identify duplicate efforts and remove counterproductive…

    • 2117 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    holds when it comes to terrorist attacks, the emergency response management teams play a huge role in the preparedness, planning, organization, and response when it comes to following up on an attack. The article, “The Four Phases of Emergency Management,” explains each of the four phases of emergency management, mitigation, preparedness, response, and recovery (Unknown Author, p.1). The first stage this article explains is mitigation, which refers to the measures that reduce the chance of an emergency happening, or reducing the damaging effects if an emergency does in fact take place (p.1). This stage ultimately creates safer communities by protecting the loss of life and/or property. The next stage is that of preparedness.…

    • 1056 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In addition to systems and (related to computers and science) aids, a good disaster recovery plan will tap key workers throughout the organization and use their intelligence, both in the planning and the execution of the plan. Getting the company's leadership to understand a disaster recovery plan and back it publically and completely is one of the most challenging, yet most necessary parts of an effective disaster recovery plan. At a low value, you need to reduce or eliminate employee resistance to the disaster recovery plan.…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Information Security Breach these days has been a popular subject in news. Almost every companies have been hacked, if not yet, they should not consider themselves as more secure than others that have already been there. In December 2013, Target was one of the victims with more than 40 million credit cards and debit cards that were stolen by malicious people. Just right before Thanksgiving a malware was installed inside target database.…

    • 1715 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    When you have to plan for potential threats, you need to consider where the business is located for instance if your company is located anywhere in the south you shouldn’t concern yourself with planning for earthquakes, you should be planning for hurricanes or tropical storms. I typical break done threat into two categories “natural threats” and “human- error threats”. Examples of natural threats are storms (depending on your location it can be either hurricanes or winter snow storms), floods, earthquakes, and fires are just to name a few, human-error threats are hardware and/or software failure, theft, any security incidents, and sometimes acts of terrorism(depending on your company location). And based of these possible threats your company can now plan out different scenarios. The next step would be determining the recovery time, which is basically determining how long your business can function and run without certain…

    • 779 Words
    • 4 Pages
    Improved Essays