Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security policy and procedures manual

24/11/2021 Client: muhammad11 Deadline: 2 Day

Security Standards, Policies, And Procedures Manual

Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.

Take on the role of Cyber Security Engineer for the organization you chose in Week 1.

Develop a 5- to 6-page manual using the Security Standards, Policies, and Procedures Template with recommendations to management of security standards, polices, and procedures which should be implemented in your chosen organization. The 5-6 page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment.

Research and include the following:

Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization.
Recommend appropriate policies and procedures for:
Data privacy
Data isolation
NDA
IP Protection
Passwords
Acceptable use of organizational assets and data
Employee policies (separation of duties/training)
Risk response
Avoidance
Transference
Mitigation
Acceptance
Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative]
HIPPA
FERPA
ISO
NIST
SEC
Sarbanes/Oxley
Incident response
Preparation
Identification
Containment
Eradication
Recovery
Lessons learned
Auditing
Environmental/Physical
Administrative

Running head: THREATS, ATTACKS AND VULNERABILITY ASSESSMENT

THREATS, ATTACKS AND VULNERABILITY ASSESSMENT

8

Threats, Attacks and Vulnerability Assessment

Anthony bahlman

CMGT/400

03/30/2019

Google LLC is a technological company from America which specializes in Internet-related products and services. Some of the products and services which are offered by Google include search engines, cloud computing, hardware, software, and online advertising technologies. It is considered among the Big Four companies which also include Apple, Amazon, and Facebook. The organization was founded by Larry Page and Sergey Brin in 1998. The founders were Ph.D. students at Stanford University in California. All facilities are subject to a certain level of risk which can be associated with different threats. The threats may be as a result of natural events, intentional acts by human beings to cause harm or accidents (Maglaras et al., 2018). The owners of companies have the responsibility of limiting or managing the risks arising from the threats to the maximum extent possible.

Tangible Assets

Google is one of the best technology companies in the world with a high number of tangible assets within its premises, especially in the headquarters located in Mountain View, California. The information systems, critical infrastructure, and cyber-related interests to be tested include the software of the company, hardware, system interfaces with consideration of internal and external connectivity, data and information, and people who use and support IT system. The aspects will be assessed because they are crucial to the day to day operations of the facility, and a breach in any aspect may lead to major disruption of services. The aspects which will not be assessed include IT system functional requirements, system users, current network topology system security policies which guide the use of the IT system and the architecture of security of the system. The aspects will not be assessed because of the minimal threat they pose to the system, and low probability of risk to arise from them. Moreover, the disruption of the items does not lead to significant interference in the operation of the organization.

Asset Descriptions

The following is a diagram of the flow of assessment activities:

The assets descriptions are outlined below:

· Hardware- Physical parts of the computers.

· IT personnel- Individuals operating computer systems.

Threat Agents and Possible Attacks

There are several threat agents and possible attacks that may face the organization. the company may be subject to floods which may be as a result of excessive rainfall or overflowing ocean water. Tornadoes are also a possible threat to the organization, and these are violent and destructive rotating winds. Other possible natural threats to the organization headquarters include earthquakes, electrical storms, and avalanches. Electrical storms involve the violent disturbance of the electrical condition of the atmosphere, and such an occurrence can destroy any electrical system. The company also faces the human threat of hacking where people may make attempts to gain unauthorized access to their files. There is also the threat of unintentional acts of inadvertent data entry taking place. Another possible threat is the possibility of malicious software upload by people intending to destroy the reputation of the company (Esteves, Ramalho & De Haro, 2017). There is also the treatment of employees of the organization gaining access to confidential information using their credentials. The other possible threat of environmental nature to the organization is a long term power failure, and this may lead adversely affect them because of the use of technological systems highly dependent on power. Pollution may also affect the environment in which the workers perform their duties. The company also faces the threat of industrial espionage by the competitors. Finally, the spillage of dangerous liquids or chemicals from factories can affect the working environment.

Exploitable Vulnerabilities

The following is the list of exploitable vulnerabilities:

· Failure of removal of identifiers of terminated employees

· Buffer overflows

· The firewall of the company allows for inbound tenet, and the identification of guest is allowed on XYZ server

· The failure of application of new patches to one of the systems with an identified flaw

· The server room uses sprinklers for fire protection but there is no hardware to protect from water damage.

· The possibility of code injection in the system.

· Presence of dangling pointers

Existing Countermeasures

The organization has several existing countermeasures to threats and vulnerabilities. The data and crucial information files are backed up in an offsite location. The backup schedule is also accurate to ensure they do not miss out on any information. There are also arrangements for another location in the event that the primary site is rendered to be inoperable. There are also several procedures which protect against the unauthorized access or use of the computer systems. System monitoring is done on a regular basis for detection of any unusual aspects. The company also has a risk analysis plan and security strategy developed from the risk analysis.

Evaluation of Threats or Impacts on the Business

Threat History Events

Duration

Business Impact

Threat Resolution

Hacking

1 day

None

Change of hardware at customer sites

Hacking

Hours

None

Software upgrades.

Prioritized List of Identified Risks

Risk

Probability

Priority

Owner

Countermeasures/Contingencies/Mitigation Approach

Hacking

High

High

IT personnel

Regular software and hardware updates.

Use of two-factor authentications.

Long term power failure

Low

High

Emergency department

Establishment of power back up systems

Natural events such as flooding and earthquakes

Medium

Medium

Emergency Department

Establishment of evacuation protocols for personnel and data back up systems in offsite location

Malicious software uploads

Low

Medium

IT personnel

System restoration protocols.

References

Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J. (2018). Cybersecurity of critical infrastructures. ICT Express, 4(1), 42-45.

Esteves, J., Ramalho, E., & De Haro, G. (2017). To improve cybersecurity, think like a hacker. MIT Sloan Management Review, 58(3), 71.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Ideas & Innovations
Chartered Accountant
Calculation Master
Assignment Solver
Solution Provider
Homework Master
Writer Writer Name Offer Chat
Ideas & Innovations

ONLINE

Ideas & Innovations

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$48 Chat With Writer
Chartered Accountant

ONLINE

Chartered Accountant

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$24 Chat With Writer
Calculation Master

ONLINE

Calculation Master

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$30 Chat With Writer
Assignment Solver

ONLINE

Assignment Solver

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$31 Chat With Writer
Solution Provider

ONLINE

Solution Provider

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$31 Chat With Writer
Homework Master

ONLINE

Homework Master

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$28 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Stephanie buttermore jeff nippard - Psychotherapy With Individuals - 3d animal cell model - Gcse physics equations aqa - Champion n12yc spark plug cross reference - How to read weld symbols - Los turistas llegaron hace una semana. la guía turística les da la bienvenida. - What are the four common uses of comparative data - Define acute response to exercise - Ask Questions - Ancient egypt research questions - .I need 1200 words on Impact Sensory Marketing on Consumers Behavior - Malu kangaroo teacher notes - Philosophies and theories for advanced nursing practice 3rd edition - Burning iron wool equation - Ethics and the Global Economy" Please respond to the following: - I need help with a Managerial Final writing assignment. - Strategic controls and financial controls - Workstation domain risks - Passive congenial marriage - 59 nestor avenue bardon qld 4065 - Wordscapes level 189 rays 13 - Payday 2 burn offshore money achievement - Perkins restaurant online ordering - Rosewill rca 220 bl - Karen from accounting drag queen - Importance of scheduling for batch production - Rough Draft Qualitative Research Critique and Ethical Considerations - Jeffrey allen books pdf - Marks and grades do not reflect a student's intelligence speech - Strategic management by frank t rothaermel pdf - Dr scott fairbairn orthopaedic surgeon - Introduction to Ethics (250 words Discussion Board) - Comp10 - Examine and understand leadership theory and apply it in team environments. - Aba equal interval graph example - Days of working capital capsim - When international buyers and sellers disagree - Mixing what with what improves creativity - Db - Ethno-etiology - Usanovich concept of acid and base - 900 words 2 assignments sep 11th - Wells fargo faces la lawsuit for unethical conduct - What is first angle projection in engineering drawing - Mcgraw hill virtual lab enzyme controlled reactions - Ultimate reward travel insurance - Crime and punishment part 4 chapter 5 summary - Electrical engineering report example - Francisco tárrega cause of death - Multifactor leadership questionnaire rater form - William harvey hospital postcode - Unilever in brazil case study solution - City electric supply credit application - Finance Dissertation Topics - Assignment 6 - Career counseling case study format - How to write a video game proposal - Human Development class discussion - Ranchera valseada - Zappos ceo tony hsieh leadership style - Freight car loadings over an 18-week period at a busy port are as follows: - The work function of tungsten is 4.50 ev - Week7 health discussion assignment 455 - Multiple vendor dns query id field prediction cache poisoning - The dash between the dates poem by lucille britt - Strategic Management Case Study - Portal pymble ladies college - Specific heat capacity questions and answers - Men with courage do not slay dragons they ride them - For vincent van gogh the figure of the sower represents - Sheila tyrrell arklow shipping - Calculate the molar heat of solution of rbbr - Communication - Benzil melting point range - Kite streamers summary - Photosynthesis - An ideal monoatomic gas at expands adiabatically - Forces worksheet 2 answer key - [email protected][email protected]~9928097710 GirlfRiEnD Vashikaran Specialist Astrologer in IndORE , lucknOw - Thinking critically a concise guide john chaffee - A class divided video questions answers - Human/sex trafficking - Ipecs phone system voicemail - Nurse bullying powerpoint - Advanced Industrial Hygiene - What has six sides and six corners - An introduction to programming using visual basic 2012 answer key - HSA5400-Deliverable 6 – Preparing an Operating Budget-Memo and Excel Spreadsheet - Practical scrap metal small arms vol 5 - What is the effect of the adjusting entry for depreciation expense? - Lo - Renaming fractions as decimals - Why i love south africa essay in afrikaans - Cost volume profit analysis questions and answers doc - Public administration week 8 - What does i am the mustard seed mean - Can physical therapists accept gifts from patients - What is the cash realizable value after the write off - Cops and rodders car show north brunswick nj