Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Ids desktop solution

26/03/2021 Client: saad24vbs Deadline: 2 Day

Running head: ROLES IN THE CYBER DOMAIN 1

ROLES IN CYBER DOMAIN 5

Roles in the Cyber Domain

Your Name

Course Number & Title

Instructor's Name

Month Day, Year

Part A

The Intrusion Detection System (IDS) offers exceptional and pertinent information and data about the organization’s network security. However, the control and examination of the data, information, and the IDS is of equal importance which needs a team of knowledgeable personnel (Proctor & Chen, 2015). This calls for the inclusion of human interaction. While the Chief Information Officer (CIO) already has a team, an additional number of experts to be included are recommended. This will add up to the human resource deficits required to rollout and support an IDS desktop solution. Besides the IDS desktop solution, the team will be tasked with creation of appropriate intrusion detection mechanisms by use of software, audit analysis of event logs including the IDS logs, performing a periodic audit of intrusion detection procedures, and offering cyber security and intrusion detection training to other staff. With regards to the number of additional employees for the rollout and

Support for the IDS desktop solution, an additional number of five members is suggested.

The additional employees will be responsible for various roles that relate to their various job titles. These are the Systems Developer, Systems database Administrator, Configuration Management Manager, Implementation Officer, and Systems Quality Assurance Officer. In conjunction with the existing desktop support and malware team, these additional members will foresee that the organization has the ability to properly use its Intrusion Detection System software properly. While the existing team will examine the information and data from the IDS, the additional members through the specific roles assigned to their job designations will take necessary actions concerning the information gathered from the IDS and the repository center if any. It is assumed that there will be a central repository system where crucial information from the IDS will be found (Ogbu & Oksiuk, 2016). For instance, after the IDS identifies a possible anomaly, then isolates it from normal operations, and blocks its interaction with the organization’s systems, this information will be sent to repository center, additionally, hat information will be received by the Systems Database Administrator and other executives within the Intrusion detection team of the organization.

The Systems Developer is tasked with the installation, testing, and maintenance of the IDS programs and software, preparing training manuals for other staff, and presenting any suggestions relating to the improvement and update of the system. The Systems database administrator will be responsible for the confidentiality of sensitive information resulting from the IDS. This includes the provision of mechanisms that enable the proper storage, availability to designated executives of the organization, protection form loss or compromise, and retrieval of the information. The database administrator will also share the information to other executives like the Chief information Officer for instance when a threat is originating from within and the person behind is known.

The Configuration Management Manager will provide the Configuration Infrastructure for the IDS and an environment that makes the work of the Systems developer easier. Configuration Management Manager will also prepare a configuration management plan, any updates on the infrastructure, and provide the configuration status on a regular basis. The Implementation Officer will act as a link between the IDS team and the management of the organization. The implementation Officer will be part of the general planning of the IDS and will report the status or challenges or milestones of the IDS program to other stakeholders within the organization. The Quality Assurance Officer will be responsible for keeping the operations of the IDS to be in line with the standards of quality Information Technology Security Systems, ensure compliance to any regulatory body or stipulations, and determine the business value of the IDS to the organization. The Quality Assurance Officer will additionally make sure the IDS offer a business value to the organization and maintain that value.

Part B Infographic

Recommended Industry Certifications

· GIAC certification for Intrusion Analyst

· CISCO Security Certification

References

Proctor, R. W., & Chen, J. (2015). The role of human factors/ergonomics in the science of security: decision making and action selection in cyberspace. Human factors, 57(5), 721-727.

Ogbu, J. O., & Oksiuk, A. (2016, October). Information protection of data processing center against cyber-attacks. In Problems of Infocommunications Science and Technology (PIC S&T), 2016 Third International Scientific-Practical Conference (pp. 132-134). IEEE.

Systems Developer

Install

Congfiguration Management Manager

Provide a suitable and dependable Configuration Management Infrastructure

Quality Assurance Officre

Regulatory Compliance

Database Administrator

maintain confidentiality of information from IDS

Test

Maintain

Confer business value to IDS

maintain availability information from IDS

proper storage information from IDS

prevent loss or compromise of information from IDSmaintain confidentiality of information from IDS

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Calculation Guru
Assignments Hut
Financial Hub
Quality Assignments
George M.
Unique Academic Solutions
Writer Writer Name Offer Chat
Calculation Guru

ONLINE

Calculation Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$17 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I will cover all the points which you have mentioned in your project details.

$26 Chat With Writer
Financial Hub

ONLINE

Financial Hub

Give me a chance, i will do this with my best efforts

$63 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

I have read your project details. I can do this within your deadline.

$63 Chat With Writer
George M.

ONLINE

George M.

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$36 Chat With Writer
Unique Academic Solutions

ONLINE

Unique Academic Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$70 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

What is Minecraft MOD APK? - How to write a literature review outline - How to show multiple marriages on a genogram - Swot analysis of apple airpods - Http www yourleadershiplegacy com assessment html - 2 bit synchronous up down counter - Pandemic Voting - Blue gold water wars documentary - W6 - Project paper , Due date 26th September - Entity relationship diagram - Sponge with smiley face shark tank - Aden veterans association membership - The old man and the guitar painting - Microsoft publisher mouse jumping - Jennifer aniston commercial for aveeno - Nursing assignment - Steel axes for stone age australians - Andrew must deny a customer's application for credit. what organizational pattern should he use? - Ism suffix medical terminology - Brenau canvas web - In what ways do art historians define artistic styles - Business Model - What are the most important elements of fitbit's competitive strategy - What is the inventory control system for widgets - Identifying an unknown hydrogen carbonate lab answers - Dic chap 7 - Fin 370 week 1 assignment - Southwark streetscape design manual - Leo alhalabi net worth - Difference that emerges from our male and female bodies. - Faith mortis text to speech - D904 allied health referral - As3008 current-carrying capacity table - Andy warhol twenty five colored marilyns - Christ alone cornerstone weak made strong - Organisational Theory - Steering rack gaiter split - Hau lee supply chain uncertainty framework - Andy cano menendez death - Seven aspects of culture - Hlr and vlr in mobile computing - Calculate rf value gel electrophoresis - Riddells creek scout camp - Online examination system project documentation - Lingual arch space maintainer indications - Structural cues in reading - Create an advertising campaign assignment - Why are antiglycolytic agents used for collecting certain blood specimens - Vodafone erp implementation failure - Www lk case pages case4you - Creswell mixed methods research pdf - Speech - The mysteries of harris burdick inferencing lesson - Luminous efficiency of a fluorescent tube is - Lg hi macs white granite - Going global lessons from late movers - Pulse credit union internet banking - J2 - Well log correlation methods - Maze runner vocabulary chapter 1 10 - Application of self induction and mutual induction - Inspected write off qld - Community health windshield survey - Ethics of the milgram experiment - Discussion 150 words - Briefly explain the basic principles of underwriting - Sand dollar aristotle's lantern - Square d trip curves - How to front end estimate - Http www hhmi org biointeractive virus explorer - Impact of cloud computing in Retail Business - George grosz grey day - Target power bank - Bio rad stain free gels - Cash cow win page - Paper - Negotiations - Identifying and Interpreting Descriptive Statistics - Basic laboratory techniques report sheet answers - The involvement of the csirt in incident response typically starts with prevention. - My guitar shop sql answers - Sissinghurst castle national trust - De moivre's theorem and nth roots - Week 6 - Assignment 6 - Financial Statement Analysis - Walmart supply chain case study pdf - Herbivores in the sahara desert - Meaning of shooting stars - George fitzhugh cannibals all summary - Quantitative Analysis 8381 - Create a scenario summary report excel 2013 - Figurative language poster project - Formula of manganese iv oxide - How much are you willing to pay survey question - Ted hughes conflicting perspectives - Why use gibbs model of reflection in nursing - Explain why noble gases tend not to react - Challenge yourself 3.3 excel answers - Narrative orientation complication resolution