Responses 229 word week 5

responses, make sure to identify at least one problem with the approach suggested on how to meet a security management goal.

Response baised on bellow post

                  byrodney

Identify and talk about at least one security management goal, then explain a difficulty in meeting that goal. Offer a way to meet that management goal. In your classmates’ responses, make sure to identify at least one problem with the approach suggested on how to meet a security management goal.

Security management goals can be a wide range of topics and are generally not defined and articulated well (1). The basic management goals of cybersecurity are confidentiality, integrity, and availability of systems and information (2). Even these basic goals are too broad for this particular discussion. We will look at one aspect of one of these goals. One of the goals under confidentiality is to improve the security involving the insider threat.

Confidentiality is controlling access to files and ensuring only the right people have access to the right information with the correct permissions (3). This makes the insider threat challenging because the users must have access to the systems and files that are required to do their jobs and since they have some access, it makes it easier for the insider to circumvent security controls without raising any alarms. Another aspect that makes the insider threat challenging is that it involves human nature. You cannot place automated controls on people themselves like you can computers and systems.

There is no single mitigation to solve this problem. Like the security program itself there are several layers of controls that must be put into place in order to reduce the risk from an insider threat. These areas of mitigation include:

Hiring Practices

Policies and Procedures

Training

Culture

Automation

Mitigation starts before an employee begins work at the company. The Human Resource department should be doing background checks to include social media posts to understand the person that they are going to entrust with their data (4). Policies and procedures are another area of importance. These documents convey to employees what they can and cannot do on the network. They may also inform employees of reporting procedures if they find problems themselves. This also sets the legal framework to be able to remove an employee if needed (5). Training is needed to help employees understand these policies and procedures as well as why they are in place. Many times people are more likely to follow them if the understand the purpose (6). Policies and procedures can also give the system administrators ways to prevent these attack through procedures such as ensuring user accounts are disabled when an employee leaves the company to include changing all passwords that they may have had access too, especially administrator passwords (7).  Culture is often an overlooked area. If employees are happy in their jobs and feel like the company is taking care of them they are less likely to turn against it. Most insider attacks are caused by disgruntled employees. Automation can help monitor the networks to understand things that may be out of place or abnormal. This may provide the red flag that alerts someone to investigate a little more. It also provides audit logs that can be used to help trace information back to the source or show user accounts that shouldn’t be there. Constant reevaluation is needed of all of these areas to understand any changes and adjust the systems as needed (8).

There are many security management goals that must be met in order to provide security, guarding against the insider threat is just one of them. This forum is just a short overview of this threat so not every aspect has been covered.

Calculate Your Essay Price
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more