Running head: ROLES IN THE CYBER DOMAIN 1
ROLES IN CYBER DOMAIN 5
Roles in the Cyber Domain
Your Name
Course Number & Title
Instructor's Name
Month Day, Year
Part A
The Intrusion Detection System (IDS) offers exceptional and pertinent information and data about the organization’s network security. However, the control and examination of the data, information, and the IDS is of equal importance which needs a team of knowledgeable personnel (Proctor & Chen, 2015). This calls for the inclusion of human interaction. While the Chief Information Officer (CIO) already has a team, an additional number of experts to be included are recommended. This will add up to the human resource deficits required to rollout and support an IDS desktop solution. Besides the IDS desktop solution, the team will be tasked with creation of appropriate intrusion detection mechanisms by use of software, audit analysis of event logs including the IDS logs, performing a periodic audit of intrusion detection procedures, and offering cyber security and intrusion detection training to other staff. With regards to the number of additional employees for the rollout and
Support for the IDS desktop solution, an additional number of five members is suggested.
The additional employees will be responsible for various roles that relate to their various job titles. These are the Systems Developer, Systems database Administrator, Configuration Management Manager, Implementation Officer, and Systems Quality Assurance Officer. In conjunction with the existing desktop support and malware team, these additional members will foresee that the organization has the ability to properly use its Intrusion Detection System software properly. While the existing team will examine the information and data from the IDS, the additional members through the specific roles assigned to their job designations will take necessary actions concerning the information gathered from the IDS and the repository center if any. It is assumed that there will be a central repository system where crucial information from the IDS will be found (Ogbu & Oksiuk, 2016). For instance, after the IDS identifies a possible anomaly, then isolates it from normal operations, and blocks its interaction with the organization’s systems, this information will be sent to repository center, additionally, hat information will be received by the Systems Database Administrator and other executives within the Intrusion detection team of the organization.
The Systems Developer is tasked with the installation, testing, and maintenance of the IDS programs and software, preparing training manuals for other staff, and presenting any suggestions relating to the improvement and update of the system. The Systems database administrator will be responsible for the confidentiality of sensitive information resulting from the IDS. This includes the provision of mechanisms that enable the proper storage, availability to designated executives of the organization, protection form loss or compromise, and retrieval of the information. The database administrator will also share the information to other executives like the Chief information Officer for instance when a threat is originating from within and the person behind is known.
The Configuration Management Manager will provide the Configuration Infrastructure for the IDS and an environment that makes the work of the Systems developer easier. Configuration Management Manager will also prepare a configuration management plan, any updates on the infrastructure, and provide the configuration status on a regular basis. The Implementation Officer will act as a link between the IDS team and the management of the organization. The implementation Officer will be part of the general planning of the IDS and will report the status or challenges or milestones of the IDS program to other stakeholders within the organization. The Quality Assurance Officer will be responsible for keeping the operations of the IDS to be in line with the standards of quality Information Technology Security Systems, ensure compliance to any regulatory body or stipulations, and determine the business value of the IDS to the organization. The Quality Assurance Officer will additionally make sure the IDS offer a business value to the organization and maintain that value.
Part B Infographic
Recommended Industry Certifications
· GIAC certification for Intrusion Analyst
· CISCO Security Certification
References
Proctor, R. W., & Chen, J. (2015). The role of human factors/ergonomics in the science of security: decision making and action selection in cyberspace. Human factors, 57(5), 721-727.
Ogbu, J. O., & Oksiuk, A. (2016, October). Information protection of data processing center against cyber-attacks. In Problems of Infocommunications Science and Technology (PIC S&T), 2016 Third International Scientific-Practical Conference (pp. 132-134). IEEE.
Systems Developer
Install
Congfiguration Management Manager
Provide a suitable and dependable Configuration Management Infrastructure
Quality Assurance Officre
Regulatory Compliance
Database Administrator
maintain confidentiality of information from IDS
Test
Maintain
Confer business value to IDS
maintain availability information from IDS
proper storage information from IDS
prevent loss or compromise of information from IDSmaintain confidentiality of information from IDS
Applied Sciences
Architecture and Design
Biology
Business & Finance
Chemistry
Computer Science
Geography
Geology
Education
Engineering
English
Environmental science
Spanish
Government
History
Human Resource Management
Information Systems
Law
Literature
Mathematics
Nursing
Physics
Political Science
Psychology
Reading
Science
Social Science
Home
Blog
Archive
Contact
google+twitterfacebook
Copyright © 2019 HomeworkMarket.com