Tuesday, October 16, 2018

Discussion Board

In summarizing the company’s IT strategy, the focus will be the definition of the skills and specialties that are available in the company to ensure that we have the workforce to address all the issues concerned with the implementation of the plan. In this case, there will be the clarification of the individuals with the business management skills, referring to the individual possessing the political authority to establish the time that systems can be taken down for the different forms of remediation as well establishing when it is necessary to call for assistance (Hayden, 2010). Further, the report will be addressing the access network skills which encompass the possession of the abilities that can be used in the monitoring of the intrusion detection systems in the organization. Further, this report is going to entail the assessment of whether the organization possesses individuals with the necessary skills to modify the firewall access lists, isolate the network segments as well as trace IP addresses and MAC address to the diverse specific switch ports.
 The IT strategy summary is further going to address issues of the desktop as well as server administrators. In this case, it will encompass the assessment of the strategies that the IT department has in place to ensure that it has the necessary skills and specialties, possessing professional who have admin level access to the systems that the organization possesses. The summary will be on the experience of the IT professionals that the organization has and their experience in dealing with the systems and any changes that could be made to the operations.  The summary will additionally look into the legal and human resources capacities that are within the organization to assist in the matters relates to the legal elements of the IT policies, regulation as well as investigations (Peltier, 2016). Further issues addressed, in summary, shall include the access to the forensic skills, contacts that are accessible to law enforcement as well as the physical security access equipment that has been put in place to address the different security matters in the organization.
It will be imperative to ensure that the summary that the organization’s CEO gets has the necessary issues relating to the training issues affecting the IT department at the organization. The fact that it is not possible to access a training budget that meets all the department needs as sending all the incidence response personnel along with their backups, it will be instrumental to ensure that the CEO is aware of how the available budgets were used in reinforcing the department’s readiness (Ahmad, Hadgkiss & Ruighaver, 2012). The organization’s IT department will have to receive the necessary training on such issues as exploits and incident handling and thus the manner in which the available budget will be used to cater for these issues.
The success of the organization’s security plan is dependent on their incidence response process and thus will be essential to ensure that the CEO is aware that all the phases of the incident response are addressed. On the preparation phase, it is evident that the organization has developed reliable incident handling exercises that are meant to facilitate the identification as well as effective response to the diverse issues that may arise. The IT department has further enhanced the preparation of the personnel in the department by ensuring that there is the provision of appropriate training (Baskerville, Spagnoletti & Kim, 2014). It is also essential to promote awareness of the indemnification of incidents, the management policy as well as the procedures for IT staff and all other stakeholders to appreciate the responsibilities that are related to the incidents.

The IT department has addressed all the issues necessary to ensure that the organization can identify the diverse issues that can impact their productivity enough to implement counter strategies. In this case, the department has been implementing regular monitoring as well as intrusion detection activities as tracking and analyzing threats and vulnerabilities to ensure that the organization is best protected against any form of threats (Whitman, Mattord & Green, 2013). Some of these steps encompass the proactive vulnerability assessment that is meant to implement protective interventions, ensuring that the organization addresses the threats before they become major issues.
The response as the additional attribute that has been addressed in preparing the organization IT infrastructure has been involving the assessment of the received information to establish the nature of the incidences and offer the appropriate mitigation advice for the concerned issues. For the incidences that are considered as low risk, the data is logged and the circumstances evaluated as an integral component of the situational awareness (Ahmad, Hadgkiss & Ruighaver, 2012). The high-risk case encompasses the implementation of the necessary coordination of the security interventions with the diverse departments in the organization.
The recovery component of the IT response encompasses the introduction of the necessary steps that ensure that the organization resumes the normal operations. The steps that take place in this phase of the incidence report encompass the alignment of the internal departmental processes as process management, incident management, and configuration as well as change management (Baskerville, Spagnoletti & Kim, 2014). Once all the operations resume to the normal status, the departments start monitoring the system for any suspicious activities.
The completion of these steps is followed by a description of the lessons that have been learned from the incidences, addressing how to improve the organization’s security infrastructure as well as whether there are adequate resources to implement the improvement. Further, it is imperative to assess the manner in which the organization’s incidence response can be improved, looking at the necessary training for the department personnel and the issues that make the composition of the team either adequate or inadequate (Whitman, Mattord & Green, 2013).

References
Ahmad, A., Hadgkiss, J., & Ruighaver, A. B. (2012). Incident response teams–Challenges in supporting the organisational security function.Computers & Security, 31(5), 643-652.
Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managing a strategic balance between prevention and response. Information & management, 51(1), 138-151.
Hayden, L. (2010). IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data. McGraw-Hill Education Group.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.
Whitman, M. E., Mattord, H. J., & Green, A. (2013). Principles of incident response and disaster recovery. Cengage Learning.


Sherry Roberts is the author of this paper. A senior editor at Melda Research in best nursing writing services if you need a similar paper you can place your order for custom nursing papers.

No comments:

Post a Comment