Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cyber domain parts

22/12/2020 Client: saad24vbs Deadline: 12 Hours

Running head: ROLES IN THE CYBER DOMAIN 1


ROLES IN CYBER DOMAIN 5



Roles in the Cyber Domain


Your Name


Course Number & Title


Instructor's Name


Month Day, Year


Part A


The Intrusion Detection System (IDS) offers exceptional and pertinent information and data about the organization’s network security. However, the control and examination of the data, information, and the IDS is of equal importance which needs a team of knowledgeable personnel (Proctor & Chen, 2015). This calls for the inclusion of human interaction. While the Chief Information Officer (CIO) already has a team, an additional number of experts to be included are recommended. This will add up to the human resource deficits required to rollout and support an IDS desktop solution. Besides the IDS desktop solution, the team will be tasked with creation of appropriate intrusion detection mechanisms by use of software, audit analysis of event logs including the IDS logs, performing a periodic audit of intrusion detection procedures, and offering cyber security and intrusion detection training to other staff. With regards to the number of additional employees for the rollout and


Support for the IDS desktop solution, an additional number of five members is suggested.


The additional employees will be responsible for various roles that relate to their various job titles. These are the Systems Developer, Systems database Administrator, Configuration Management Manager, Implementation Officer, and Systems Quality Assurance Officer. In conjunction with the existing desktop support and malware team, these additional members will foresee that the organization has the ability to properly use its Intrusion Detection System software properly. While the existing team will examine the information and data from the IDS, the additional members through the specific roles assigned to their job designations will take necessary actions concerning the information gathered from the IDS and the repository center if any. It is assumed that there will be a central repository system where crucial information from the IDS will be found (Ogbu & Oksiuk, 2016). For instance, after the IDS identifies a possible anomaly, then isolates it from normal operations, and blocks its interaction with the organization’s systems, this information will be sent to repository center, additionally, hat information will be received by the Systems Database Administrator and other executives within the Intrusion detection team of the organization.


The Systems Developer is tasked with the installation, testing, and maintenance of the IDS programs and software, preparing training manuals for other staff, and presenting any suggestions relating to the improvement and update of the system. The Systems database administrator will be responsible for the confidentiality of sensitive information resulting from the IDS. This includes the provision of mechanisms that enable the proper storage, availability to designated executives of the organization, protection form loss or compromise, and retrieval of the information. The database administrator will also share the information to other executives like the Chief information Officer for instance when a threat is originating from within and the person behind is known.


The Configuration Management Manager will provide the Configuration Infrastructure for the IDS and an environment that makes the work of the Systems developer easier. Configuration Management Manager will also prepare a configuration management plan, any updates on the infrastructure, and provide the configuration status on a regular basis. The Implementation Officer will act as a link between the IDS team and the management of the organization. The implementation Officer will be part of the general planning of the IDS and will report the status or challenges or milestones of the IDS program to other stakeholders within the organization. The Quality Assurance Officer will be responsible for keeping the operations of the IDS to be in line with the standards of quality Information Technology Security Systems, ensure compliance to any regulatory body or stipulations, and determine the business value of the IDS to the organization. The Quality Assurance Officer will additionally make sure the IDS offer a business value to the organization and maintain that value.


Part B Infographic


Recommended Industry Certifications


· GIAC certification for Intrusion Analyst


· CISCO Security Certification


References


Proctor, R. W., & Chen, J. (2015). The role of human factors/ergonomics in the science of security: decision making and action selection in cyberspace. Human factors, 57(5), 721-727.


Ogbu, J. O., & Oksiuk, A. (2016, October). Information protection of data processing center against cyber-attacks. In Problems of Infocommunications Science and Technology (PIC S&T), 2016 Third International Scientific-Practical Conference (pp. 132-134). IEEE.


Systems Developer


Install


Congfiguration Management Manager


Provide a suitable and dependable Configuration Management Infrastructure


Quality Assurance Officre


Regulatory Compliance


Database Administrator


maintain confidentiality of information from IDS


Test


Maintain


Confer business value to IDS


maintain availability information from IDS


proper storage information from IDS


prevent loss or compromise of information from IDSmaintain confidentiality of information from IDS


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$82 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$85 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$80 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

List of winter olympics - Otitis media soap note example - Advocacy and opposition rybacki & rybacki 7th edition pdf - Changes to System categorized as High Impact - What is a persuasive device - Reflection Paper- minimum 3 pages - Table of common ions - Waterbury insurance company wants study - Tpg account sign in - Oxy-fuel cutting speed chart - Btec assessment tracking sheet - Is co heavier than oxygen - D7 - Parallax lab answers - The monkey wrench gang pdf - Discussion / Answer 2 questions and comment on 2 students / 200~300 words for answers / need in 12 hours - Can You Please Solve this - Areas of trapezoids rhombuses and kites worksheet - Aviation - Martinez company's relevant range of production is - Barberry inc manufactures a product called fruta - Math sprints grade 5 module 4 - Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out - Operational excellence organizational structure - Veruca salt golden ticket monologue - Pretending to explain your reading material to a fellow classmate helps you to - Explain the meanings of total architecture and machines for living - Dean woodcock neuropsychological battery dwnb houghton mifflin harcourt - School uniforms help students focus - David adler spray painting - Strategic management assignment on coca cola - Mathematics vision project answers module 1 - Still alive ruth kluger chapter summaries - Million dollar minute winner andrew - Writing an essay - Petrol pump minimum delivery - Dr kushner's personality type diet quiz - 8.COURSE NAME - MARKETING MANAGEMENT - Entrepreneurship final exam questions and answers - Nsbm computer science degree - The blind side inaccuracies - Rmit interior design short course - Week 2 case study supply and demand - Mystery of history timeline figures - Young Nyana - Anu student id card - Uclan midwifery short course - Online scholarship practice tests - Fire protection hydraulics and water supply - LeaderAsChangeAgent_Assessment4 - State bank of india sydney - Track lighting current limiter - Brighton rock candy shop - T - Activity 10 gdp and its cousins answer key - Project PPT.. Deadline is 8/9/2020 5 pm CST - Bletchley to kingston milton keynes bus - Auditing - Gf - A. How is political authority established in the Classic of Documentsand the Classic of Odes?
or 
B. If Ode 41 (SCT p. 40) were composed in today’s society, what political interpretation could you give it?
 - Honda asimo 2017 - Hero archetype examples in movies - Managerial Epidemiology Week 4 project - Why I want to be a Nurse - Kite runner Essay - Which sentence uses the word diligence correctly - Why lyman series lies in uv region - Chemical reactions of copper lab answers - Discussion Board - Data visualization makes complex data more _______________ - Energex air conditioning rebate - Managed care organization vs accountable care organizations - Costco case study crafting and executing strategy - Merchants of doubt youtube - Need the following 1. Reflection & Discussion post 2. Short essays. These are two seperate assignments with 500 words each. - Samsung head office uk - Liebst du um schönheit clara schumann sheet music - Astro unl edu naap hr animations hr html - University of new south wales calendar - How many chapters are in jasper jones - Internal resistance of a battery lab report - Single index model vs markowitz - What could explain this distribution of mesosaurus fossils - Security systems ultimately depend on the behavior of its - Statistical inference confidence intervals - The execution of wanda jean movie - Manor top medical centre - How to sell csgo items for paypal - Clarke fire pump block heater - Tirso de molina don juan pdf - Ecological niche worksheet answers - Assignment #013 - Kuta software infinite pre algebra one step equations with fractions - Pooled development fund act - The plaid avenger's world 9th edition 2017 - Verification and validation techniques - MK 405 Choose a popular video marketing campaign. Using the 'best practices for video marketing' discussion in your text as a guide, explain why you think the campaign was successful. Remember share a link for your example. - Pros and cons of postponement strategy - Country music south australia - Light vs darkness archetype