Friday, September 27, 2019

DISCUSSION

 

 

 

 

 

 

 

 

 

 

 

 

Discussion

Student's Name

Institutional Affiliation

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 1

Discussion

A network or system intrusion refers to any unapproved activity carried out on a laptop or computer network without the organization knowledge (Gorman, Catherine, Peragine, Conrad., Gearhart, & Moy,2004).  Defenders needs to have a clear understanding of how the attackers operate, so that they can be able to detect any network instruction on their company or business networks. The attacker, in most circumstances, carry out unwanted activities to absorb network resources purposed for particular uses. Furthermore, they usually threaten the security of the data or network information. However, with proper designing and organizing of network attack detection structure, helps to hunk the intruders or the network attackers( Kasper, Beriswill, & Wiley,2007). Adobe is an excellent example of a company that experienced network attack, in the year 2013, the company information technolodge infrastructure system was attacked. The attackers were targeting the personal information of about 2.9million, personal information such as password, names, credit card information like numbers and dates of expiring. The net instruction was carried out because the company was experiencing security breach on their publisher department, the attack was successful because the information system of Adobe company and 40GB of their source codes was access and stolen by the attackers ( Agah, A., Das, Basu,& Asadi,2004, September).

Additionally, the most important personal information was stolen. The attack was significantly targeting security practices and company passwords. Furthermore, the company suffered a significant blow of the attackers accessing their bank details. The bank details are very crucial information for any company. Because if a network intrusion occurs successfully, the attackers are able to know the company revenue, this information is critical because they can share the info to robbers. Then company can easily be robbed by the robbers because they will be attracted by the money.

REPLY 1

Adobe company adopted the following methods to prevent further attack on its network system, the company advised all its customer to always turning off java scripts Reader and Acrobat, the company expert recommended the turning off of the java scrips and the Acrobat, because most of the network intrusion, depends on the use of the java scrips to attack the company network. More so uses were advised always to check if the Acrobat and java script are authorized .Additionally, the company informed its users always to check the Adobe flash and Readers setting to apply upon and always to make sure the Flash player and Adobe Reader are up to date. Another method that the company used was to prevent network intrusion in plag information leaks. The company come up with policies that discriminate sharing of confidential data. This was targeting to prevent flow out of very sensitive company data through emails, printed copies, and messages which people keep on sharing about the company information that they can keep to themselves.

Furthermore the company come up with instruction detection system (IDS), this system which were configured with business plans that were scanned with Avery unique phrase, which was very difficult be found in any other organization, therefore, the intrusion detection systems could easily detect and alert the company whenever they see any telltale snippets on the company network. The use of Email firewalls was also an essential software that was enhanced, the firewall is used to scan the full text of all the emails from the company. Furthermore, the digital rights and management tools help in the restriction of the distribution of company documents with crucial information by only assigning access to the network to the right people. The device denies access person to unauthorized people.


References

Gorman, D. B., Catherine, G. J., Peragine, R., Conrad, B., Gearhart, G. D., & Moy, D. (2004). U.S. Patent No. 6,711,127. Washington, DC: U.S. Patent and Trademark Office.

Kasper, J. W., Beriswill, P. A., & Wiley, K. L. (2007). U.S. Patent No. 7,243,371. Washington, DC: U.S. Patent and Trademark Office.

Agah, A., Das, S. K., Basu, K., & Asadi, M. (2004, September). Intrusion detection in sensor networks: A non-cooperative game approach. In Third IEEE International Symposium on Network Computing and Applications, 2004.(NCA 2004). Proceedings. (pp. 343-346). IEEE.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 2

 Over the recent years, most companies developed a contingency system plans to safeguard the network, contingency plan refers to course of an act intended to help a company or an organization to respond to successfully to a significant future occurrence or situation that might occur to the organization network (Gallagher,2003) Additionally, a contingency plan is also  described as plan B, since it can be run as a substitute for action, if the anticipated results fail to happen. More so, contingency planning is a constituent of an organization continuity, tragedy retrieval, and organizational risk manager (Childs, & Dietrich, 2003). Chevron infrastructure Energy Company is one of the best company that has developed a contingency plan, Furthermore it one of the vas companies that practices use of seismic visualize technologies. In their company that facilitate them advance the effectiveness of the progression and give top results. Because risks and reservations are the considered features of the current commerce world. Therefore, chevron Infrastructure Company established all the essential security machinery which, as a result, help the company in protecting and taking care of their network systems. Chevron company implanted the plan, that is contingency plan because the plan, help to facilitate the company business functions, more so the program helps the business to continue with its operations effectively. Helps them to be prepared to face any uncertainty and risk, which may affect the company operations and growth if experienced. End-users play a crucial function in the contingency strategy, they are tangled the development and establishment of the contingency plans and also in designing a better security mechanism to regulate the adverse impacts of uncertainties and risks. Because if a company experience the problem, the company uses a lot of resources and time to resolve the issue hence affecting the company in terms of growth and profit margins. Therefore it is essential for any company or organization to embrace the use of a contingency plan.

REPLY 2

However, along with the numerous merits of engaging end-user in the contingency strategy, have a couple of drawbacks and other matters. For instance, the End users designed apparatuses and applications for the practice of the contingency plans; they often flop to react during the circumstance of disasters and business occurrence without a plan. Therefore, affecting the company or business operation adversely (Baruch, 2006). A contingency plan is described as an ultimate option for companies and organization and is kept as a side plan; in such circumstances, the end-user displays less interest to business and company calls, therefore. As a result of this, it directly affects the end business or company objectives hence lowering the business profit and growth. Most business and companies suffer this problem of end-users falling to show interest to the business calls. Another pitfall is the problem of the end-users displaying very little organization responsibility in the program of the contingency strategy, for running and maintaining the whole complete platform. Some of the end-user are not always either in a position to run the entire project, or they are just not interested in the contingency plan for the business. Hence this making the program to fall or not to be useful for the business. Therefore, in case of any risk or uncertainties, the company will suffer immense loss. Lastly, there is the problem of inadequacy of security and other crucial control systems, due this shortage of security and control mechanisms, causes an issue in safeguarding of the business during some of the unplanned business occurrences. Business and companies are encouraged to employ enough security mechanism in order to maintain the effectiveness of the end-user plan, and as a result business benefit.


Reference

Gallagher, M. (2003). Business continuity management: How to protect your company from danger. Prentice Hall.

Childs, D. R., & Dietrich, S. (2003). Contingency planning and disaster recovery: a small business guide. John Wiley & Sons.

Baruch, Y. (2006). Career development in organizations and beyond: Balancing traditional and contemporary viewpoints. Human resource management review, 16(2), 125-138.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 3

The most important element of an origination is the security information backup and the forbidding part one (Williams, 2004). Backups are basically an additional or spare of the information and data which are kept in a secure place to evade lifelong data loss. Commercial companies and organizations have lost millions of their information due to lack of back up. A good example of company that lost her information due to lack of backup, is Yahoo Company. Yahoo Company lost millions of information due to data breach, and because of lack of data back, the company lost the information pamernentily. Furthermore, the problem of system breach can be avoided by having a strong security network monitors (Otway, 2001). Information in accompany can be back up mainly in two major ways, that is, online and offline backups. Online back are also described as cloud back up. This type of information or data backups are normally done on the network, which are the third cloud providers. On the hand, offline backs are done on hardware devices such as tapes, memory cards, computer hard discs and DVD. Offline backups, are mostly used by companies and organizations because it is simple to store data or information. However, this type of backup format, normally losses their meaning after the devices becomes old or the devices get lost, another issue of offline back up is that at times the devices may be infected by virus, and as result the information get destroyed. There are so many tools that are used for backing up of organization information or data. The process of backing up information is very expensive, because of there is cost of storing, upgrading and encryption of the data during the backup process.

REPLY

Backing up of data by an organization is extremely very important .the organization or company runs gracefully if the information is well secured in a reliable backup, this help the client to depend on the organization and therefore build the trust. To establish the client trust, the origination make abit of security back up on information and data, the organization make sure it has backup data on a daily basis (McDonald, & Fastring, 2004). It is very crucial to secure media back up, and the following are ways of securing media backups, implementing access right is one methods of securing media back. Organizations need to make sure that the media backups are only accessed by few individuals who are well –authorized by the management. Furthermore, it is vital that orgninastion set restriction on the process of backing up media data, it should not involve everyone in backing up of the data. Back up media is also ensured by storing information on offsite storage. This is very important because, can image of a case where company has  stored  backup in  a CD in the office then fire breaks, that means , the company will loss up both the store data and the backup data. Hence, it is very important to store media data offsite. Another good method of securing media back up is through investing in media rated and fireproof safes, when accompany has fireproof safe, it becomes even easy for securing media back up since ,the work can just be store in paper work in the fireproof safe. Encryption of the media backup is very significant, it helps in securing the data, and more so it gives a tight security to media back up and reduces the worries of losing data.


References

Williams, J. (2004). U.S. Patent Application No. 10/713,584.

Otway, J. (2001). U.S. Patent No. 6,192,130. Washington, DC: U.S. Patent and Trademark Office.

McDonald, J., & Fastring, R. (2004). U.S. Patent Application No. 10/212,018.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 4

Computer security incident response team (CSIRT), refers to the process of running the security parts or an organization or a company (Ahmad, Hadgkiss, & Ruighaver, 2012).Organization or company security is one of the most important factor, and it is considered as prime aspect. Because it encompasses a huge amount of organization data and private information. Therefore, it is very important for an origination or a company to have a well secured background, for the organization to keep the process running successfully. Additionally, for an origination or company to have a secured environment, it requires a team that is well organized and focused on their job every time. Some of the essential skills required to work for Computer security incident response team are as follows; problem solving skills is of the them, they have to be always ready and willing to carry out numerous analysis to finish the task (Ruefle, Dorofee, Mundie, Householder, Murray, & Perl, 2014). More they should be active and good communicators, they should also have an effective ability to carry their responsivities, and they should also be in a position to educate their colleagues. Furthermore, all the employees hired by the computer security incident respace team, should have more than just the elementary level of skills. This is because they are the only people who will have the ability to work on the computer security incident response team in the organization or the company. Another important element is that individual to be hired, are supposed to have the sold experience on working with the computer security incident response team tools and software's, because this feature is considered very essential. If the CSIRT, find it difficult to get experience people to hire, it can collaborate with other organization that trains, so that can train the employees and then it absorbs them later

REPLY

Factors influencing computer security incident response team, the consider individuals who have features, that are in line with the computer security incident response team, mission, vision and objective. More so they also consider the services that CSIRT require, also the experience that the staff need to do the job effectively is considered. They also consider the foundation of their technology, and lastly the financial aspect. Computer security incidence response team, is described as the group that offers services  like, recognizing  preventing, and reacting to any computer arising security matters affect a certain organization or company (Ruefle, Dorofee, Mundie, Householder, Murray, & Perl, 2014). The CSIRST plays a very important responsivity of protecting and keeping an origination secure from any risk or susceptibilities .over the recent years, information has been costing business and organization a lot of cash. Hence it is important, a skilled, experienced, and dedicated computer security incident respond team. And one of the most important skill needed is person who is computer literate. Therefore the person must have an outstanding computer programming skills and experience. Skills in network protocols is also essential, as this will help them to explain any technical problem that an organization may be facing in the information technology Centre. Addition the team member need to have excellent information sharing skills , for example, need have the skill on how to share  good  structured report to the team which can promote answerability and dependability among the team members. More so all the group members in the computer security team must poses good analytical skills or be ready to learn in case they lack , because the skills will help them to analyses issues that in line with ,data analysis, security logs different networks .


References

Ahmad, A., Hadgkiss, J., & Ruighaver, A. B. (2012). Incident response teams–Challenges in supporting the organisational security function. Computers & Security, 31(5), 643-652.

Ruefle, R., Dorofee, A., Mundie, D., Householder, A. D., Murray, M., & Perl, S. J. (2014). Computer security incident response team development and evolution. IEEE Security & Privacy, 12(5), 16-26.

Ruefle, R., Dorofee, A., Mundie, D., Householder, A. D., Murray, M., & Perl, S. J. (2014). Computer security incident response team development and evolution. IEEE Security & Privacy, 12(5), 16-26.

 

 

 

 

 

No comments:

Post a Comment