Case Study: IT Security Plan

Improved Essays
If I will newly hired as IT Security Manager of a medium size business of 400 employees and have 6 personnel in our security department. My company CIO asked about the security plan of company, as a manger of IT company, I need to secure the data of company is my responsibility. Security strategy plan helps to prepare an organization to face any type of unwanted security issues. As a security manager first thing I will do the Identification of threat, assessment of risk and controlling and mitigation actions should be planned, implementation of recovery strategies and continuity planning, and final step is documentation.
I will plan my thoughts in an order
• Establishing security roles and responsibilities
• Training to
…show more content…
Maintaining the security for a network can be challenging task. Hackers often seem to be one step ahead of network users, even those who are following the best security practices. However, securing the network is essential to protecting for privacy, reducing the risk of identity theft, and preventing hackers from steal of important data. Before company reconnect the network can take a security practices for protecting company sensitive information and data by preventing, detecting, and responding to a wide variety of attacks. I will provide more security for our company network by constructing firewalls and regular updating the login and password credentials (Whitman, Mattord, & Green, …show more content…
The goal at this point is to create a method for evaluating the relative risk of each of the listed vulnerabilities. There are many detailed methods for determining accurate and detailed costs of each of the vulnerabilities. Likewise, there are models that can be used to estimate expenses for the variety of controls that can be used to reduce the risk for vulnerability. I will provide the continuity planning procedures; if any incident happens to the data of company the remaining operations no need to stop. It will help to continuing the operations (Whitman, Mattord, & Green, n.d.).
Recovery strategies and crisis management: As a manger I will use the mitigation control and recovery strategies for an incident. The mitigation is used to reduce the impact caused by the exploitation of vulnerability through planning and preparation. In this includes the business continuity planning. Acceptance is the other strategies to protect the information assets and to accept the outcome of its potential exploitation.
Implementation of security

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Data security in the healthcare sector must be persistent and sufficient in ensuring the privacy and protection of patient’s information. The developing threat postured by malicious coding, such as viruses and worms, and unethical hackers can by reduced by the utilization of government standardize security controls. For instance, the Health Insurance Portability and Accountability Act has established security necessities regulations to ensure the protection of health information. However, organization must address the potential risk existing an internal and external networks to tackle threats effectively. Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks. Intrusion detection systems (IDS) can screen the system to identify and eliminate security breaches. By installing necessary system security gadgets and programming as firewalls are fundamental valuable for shielding inward frameworks from outer dangers over the Internet (Cisco Healthcare Security Perspectives,…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    7/A. P1: Explain the different security threats that can affect the IT systems of originations.…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Jacob Dale, the director of IT department of Sunnylake needs to execute network security training in the entire hospital. Training of the staffs is also required because most of them were from traditional background and had little knowledge about IT. Some of the security fundamentals such as never leave the systems unlocked, enforcing well-built password policy, reset password every 45 days, take out admin rights so that the staff cannot set up software, execute policy to block weak sites. When workers focus on their own duties, they regularly don’t give attention to the following ordinary instructions for network security. Employees might accidentally guide to other security susceptibilities, as well as the unforeseen reception and spreading of computer viruses. One worker’s carelessness may guide to the entire system being…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    For every threat/vulnerability pairs, identify all the possible existing and planned controls to decrease the risk of the threat to exploit vulnerability. Security controls involve the use of technical and non-technical approaches. Technical controls are protection that are combined with computer hardware, software, and firmware. In the other hand Non-technical controls are administrative and operational controls, for instance operation procedure, security policies and environmental security.…

    • 1790 Words
    • 8 Pages
    Great Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    Nevertheless, most responding to Information Security's critical infrastructure survey say that their industry/sector is better prepared for cyberattacks than they were prior to 9/11. The optimistic responses make sense, since protecting revenue-producing accesses through measured mechanisms and policies is good for business.…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In every single large organisation, security of data and system are very important. I will describe how network security and software are able to keep the data and systems secure. I will write about alternative network security methods and software which every single company should use. I will also explain these terms to show a better understanding of how important it is ti protect data and system which an organisation is working with. I will describe: Firewall configuration, Audit logs, Virtual Private Networks (VPN), Anti-virus, software updating, username and password and backup.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    This is the specific approach that GCU will take in the occurrence of a security breach or a cyber attack. Following these steps will minimize exposure area, reduce costs, down time and damage to the business interests.…

    • 1879 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    It is imperative that we have the proper systems in place to ensure that those attacks don’t take place and even if they do, there are little to no damages. As with any organizations playing on the global stage especially one in the financial services industry, policy is key. I will ensure that there is a creation of an enterprise risk organization, in addition to a risk manager embedded within all of Zunis business unit. Enterprise risk will ensure that there is a framework in place and policies to handles cyber security issues of every nature that may affect the company, there will be updates to the incident and reporting awareness policy, there will be updates to electronic application use policy, there will be quarterly training sessions for all employees to bring them up to speed on how to detect social engineering techniques and email phishing. I will ensure that Zunis works closely with public policy unit to lobby lawmakers on national cyber security policy in the various countries of operations. We will also establish proper controls, on the physical security side, the use of CCTVs, sensors, card scanning entrances and exits make people aware but also security conscious. In terms of database security, the principle of least access will be applicable. All non – essential staff will not have access to passwords for production databases and servers or any other systems not needed for normal job functions. Spam filters will be applied to outgoing and incoming email and chat services To combat hardware attacks, Zunis will now make use of hardware that meets good business practices in addition to defined SLAs agreed to by Zunis and the vendor. All work machines will come with regularly updated and already pre-installed antivirus software. All communication between hard and software and the data flowing through will be…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    False Sense Of Security

    • 892 Words
    • 4 Pages

    Security controls are technical, physical or administrative defenses to evade, neutralize or diminish harm or inaccessibility because of risks operating on their corresponding weakness, i.e., security risk. Organizations add security controls, which is no surprise; however, it is easier than most think to bypass these controls. The business “goes through the motions of deploying a security tool or following an oversight procedure, but the benefit to the security posture might be negligible” (Zeltser, 2015).…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A security policy should fulfill a multitude of purposes which a few are: Protecting people, information and setting the rules for behavior by all company personnel. Authorizing security personnel to monitor, probe and investigate. Defining consequences of violations and security baselines. Minimizing risk. Tracking compliance with regulations.…

    • 761 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Next, we move onto evaluating the controls in place and if existing controls in place are appropriate. Making sure that new controls are created and put in the correct place to help mitigate any risk that comes up is important. An examples of controls for Wells Fargo might be antivirus software, patches to fix any vulnerabilities, periodically port scans, and annual system inventory. Some of these controls actually help mitigate multiple risk in multiple locations. Testing current controls can help determine the value of the control and if the control is actually…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security.…

    • 725 Words
    • 3 Pages
    Improved Essays