Premium Essay

Case Study: Creating an Ids Policy.

In: Computers and Technology

Submitted By jae8870
Words 831
Pages 4
SEC280 Week 6 Assignment – Joseph Ercole
Case Study: Creating an IDS Policy.

As the need to secure corporate networks continually increases, the task of ensuring the security of sensitive company data so that it is not compromised becomes increasingly difficult with each day. Gem Infosys, a small software company, has decided to secure their computer systems. The organization uses ten PCs and a broadband connection to the Internet. The management at Gem needs to formulate an IDS policy. We need to identify the steps to be performed when formulating the IDS policy.
One of the best ways to protect company networks and data from attackers is to have an Intrusion Detection System in place. Today, IDS’s are an integral part of many organizations’ network infrastructure. But having the IDS in place and not understanding why it’s in place, how it works or who will deploy and run it or how to respond in the event of an attack is counter-productive to its existence. This is why we need to formulate the IDS policy. Before the IDS is deployed, we will create a basic outline of what we are trying to accomplish with the IDS and from there, devise a strategy. So, what are we protecting the network from and how strict will we make accessibility? Sometimes beginning with the end in mind is a good way to execute the first step of any plan or strategy. Knowing how tightly or loosely you want to allow traffic to flow on the network in order to have better control over it is a good start. We obviously know that we do not want intrusions of any kind. Who will write the policy and deploy it? With that question being posed, I would assign a project leader to the task of formulating the IDS policy and letting that person put a small team together for assistance. The leader should be someone from the company who already has had exposure to network security deployment, if possible, but...

Similar Documents

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9:......

Words: 18421 - Pages: 74

Premium Essay

Dell

...eBAY.COM A Case Report for Getting Tools Used NOTE: THIS IS ONLY A PORTION OF THE GETTING TOOLS USED RESEARCH REPORT. FOR THE FULL DOCUMENT AND OTHER INFORMATION VISIT WWW.CFAH.ORG. Getting Tools Used Table of Contents Foreword by Jessie Gruman ......................................................................................................................................... 1 Executive Summary ........................................................................................................................................................ 3 About CFAH ...................................................................................................................................................................... 7 Table of Contents ........................................................................................................................................................... 8 Introduction: 21st Century Marketplace .................................................................................................................. 9 Research Framework ................................................................................................................................................... 17 Case Studies.................................................................................................................................................................... 25 Consumer Reports: Car Buying Guide ....................................

Words: 18219 - Pages: 73

Premium Essay

Management

...Literature Review On Importance of Academic Integrity & Honesty Prepared by Abdullah Alabdulhadi ID 23544 Abdulhadi Altammar ID 23970 Sayed Esmaeil ID 25167 Saud Alabdullaali ID 25393 Essa Alkandari ID 25176 Importance of Academic Integrity and Honesty Growth in school echoes from growth as a person. Dishonesty causes erosion of core values making one indecisive and having loss of self respect. Academic dishonesty is a shortcut that robs one of the benefits of learning. When colleges and universities have standards of integrity, the society and higher education reaps benefit providing foundation for a vibrant academic life, thus developing students to be responsible for future. Academic Integrity is a commitment even when the world is facing adversity. Values like trust, fairness, honesty, respect and responsibility makes principles of behavior to act academically (Center for academic integrity, 1999). Academic integrity makes others to believe in you for your honesty and act accordingly. Also, trust is a key ingredient in being a fortunate leader. Developing good ethical habits while in college helps one when entering a new workplace. Secondly, such a trait is valued by employers and they would rather invest in human capital that brings a positive impact on their organization. Acting consistently reduces lot of tension in life and makes a person more healthy and productive (Bauer.uh.edu, 2015). To......

Words: 1441 - Pages: 6

Free Essay

Data Driven School

...Problems with existing systems  Effects of the problems on Students  Idea of Data Driven School  Implementation  Improved System  Case Study Question  DDS : Perspective of Bangladesh. 4. About USA Schools 5. Problems 6. How Data Driven Concept works 7. Idea of Data Driven School 8. DATA DRIVEN SCHOOL 9. Implementation 10. Data Acquisition Data Acquisition have included: Guidance information (student placement and behavioral records). Student demographics. Classroom grades. Data on, and observation of, teacher personnel. Community survey data. Budgetary information. Master schedule and calendar information. Curricular information. Technological capacity. 11. Data Reflection we have come to define the phase schools generally move into after Data Acquisition as Data Reflection. In this phase: stakeholders work to make sense of the data that has been collected in order to develop specific goals for improving teaching and learning. 12. Program Alignment , Program Design We define Program Alignment as the process of taking conclusions from the Data Reflection phase and setting students up for success by making sure that state and local standards, school curriculum, classroom teaching, and all testing are focused on the same results. Program Design to bridge the gaps that became evident in the process of pursuing Program Alignment by creating changes in : Classroom experience  Student services And other parts of the school that they found to be out of line......

Words: 841 - Pages: 4

Premium Essay

Anything Relevant

...ASSUMPTION UNIVERSITY MARTIN de TOURS SCHOOL OF MANAGEMENT AND ECONOMICS DEPARTMENT OF MARKETING COURSE SYLLABUS SEMESTER 2/2015 |MARTIN de TOURS SCHOOL OF MANAGEMENT AND ECONOMICS’ VISION | |Leading International Business School in ASEAN Region | |MARTIN de TOURS SCHOOL OF MANAGEMENT AND ECONOMICS’ MISSION | |Shaping Graduates toward Global Business Excellence | |ASSUMPTION UNIVERSITY’S UNIQUENESS | |An International Catholic University | |IDENTITY OF AU STUDENTS | |Ethics, English Proficiency, Entrepreneurial Spirit | |COURSE ORGANIZATION ...

Words: 4075 - Pages: 17

Free Essay

A Criticism of Neoliberal Policies as a Method of Development

...A Criticism of Neoliberal Policies as a Method of Development * Neoliberalism is a philosophical theory that uses market value as the primary method of evaluating all aspects of life. Thus, the market is seen as the template for all other activities within a society, even those that involve an ethical dimension. (Paul Sukys, 2009) Thesis Statement: The pro-market principles that neoliberalism encourages do have benefits that, if managed realistically, are means of development and sustainment for countries worldwide. * “The neoliberal doctrine emphasizes competition over cooperation and in doing so encourages each individual to pursue his or her own well being, thus effectively creating "companies of one" who will sell whatever they possess (talents, property, abilities, education, and so on) in order to accumulate "points," in whatever way those points may be defined within a given system.” (Jason Read, 2008) * “Neoliberalization has not been very effective in revitalizing global capital accumulation, but it has succeeded remarkably well in restoring, or in some instances (as in Russia and China) creating, the power of an economic elite...” (David Harvey, 2007) * Neoliberalism is an ideology, method of governance, and a set of policies which originated out of classical liberalism and as a backlash to Keynesianism during the early 1980’s (Steger and Roy 2010:10-11) * Neoliberal intellectuals insisted that the ‘free market’ was a superior mechanism......

Words: 1846 - Pages: 8

Premium Essay

Supervisory Case Study Essay

...involve. They are responsible for ‘getting the job done’, by instructing and leading those they manage “maintaining the standards of the department, and creating and maintaining cooperation with employees” (Hamann, n.d, para.1). A supervisor of this type also has to know how to deal with conflict management. They also have the responsibility of “ensuring compliance with policies and procedures, initiating appropriate discipline when necessary, mentoring officers under their command, and serving as the communication link between management and line officers” (IACP,...

Words: 578 - Pages: 3

Premium Essay

Apple Leadership Skills

...the corporate culture of the company that has allowed them to go from solely a computer company to being known for its ability to come out with path-breaking products. That culture has also been tied to the innovation created at Apple and how they became the pioneer of the “Work Hard Play Hard” ethic. When Steve Jobs returned to Apple in 1996, he totally change the whole organization. With the help from his Human Resources Director, Jay Elliot, he reorganized the hierarchy of the company from the more traditional functioning vertical organization designed by the previous CEO to a flat organization, launching open communication policies and recruiting employees who were genuinely excited about creating products for the company (Shelly, 2011). Steve Job’s leadership skills and the principles for hiring the right people and developing management policies were the basis for Apple’s start and what has helped shaped the organization and defined their corporate culture. Apple's human resource management attracts a quality workforce by attracting visionary people that think freely and can see the potential in different objects. It does this through excellent human resource planning, job specifications, recruiting and the selection process. It all begins with hiring the right people, so how does Apple go about finding the best people who are passionately committed to the brand and the customer experience? The company hiring managers start by gauging candidates based on some......

Words: 1405 - Pages: 6

Free Essay

The Money Multiplier

...assumes that the money stock is determined by the money multiplier and the monetary base it is argued here that both the money stock and the monetary base are determined endogenously by the optimizing behavior of commercial banks and private agents like households and firms. An industrial organization style model for the money creating sector that describes the money creation process is developed assuming that the main policy variable of the central bank is the money market interest rate. A vector error correction model for the nominal money stock, the monetary base, nominal income, short-term and long-term interest rates, and the required reserve rate is specified, and the interaction between these variables is analyzed empirically. The evidence contradicts the money multiplier approach and supports the presented model of the money creating sector. JEL Classification: C32, E51, E52 Keywords: Industrial organization approach to banking theory, money multiplier, endogenous money, vector error correction model ∗ This paper is partially based upon the second chapter of the author’s doctoral dissertation (Vector au- toregressive analysis and monetary policy, Aachen: Shaker, 2002). This version will be published with the title “Money Stock, Monetary Base and Bank Behavior in Germany” in Jahrb¨ cher f¨ r National¨ konomie und u u o Statistik (2003), forthcoming. I thank Helmut L¨ tkepohl and J¨ rgen Wolters for helpful comments. Financial u u support from the Deutsche......

Words: 9924 - Pages: 40

Premium Essay

Lyric

...Sorensen E-Mail Address: paulherethere@yahoo.com Instructor Availability/Office Hours: You will be able to speak with the instructor before and following each class session. Appointments for additional meeting times may be made following each class session. Course Credits: 3 credits Course Prerequisites: Sophomore Level COURSE DESCRIPTION: INS301A Creativity follows a problem-based learning approach to help students use critical thinking and creativity to examine issues in the business world. This course focuses on three core areas: (a) the elements of creativity, (b) creative problem solving, and (c) innovation for entrepreneurship and business growth. Students will develop their own creative competencies through a combination of case analyses and kinesthetic activities designed to encourage innovative solutions to modern business problems. TEXTBOOK No textbook is required. Other required materials are specified in the course schedule. USEFUL WEBSITES You must know how to access the Keuka College library resources (using your Keuka username and password). Introduction to the library for international students: http://libguides.keuka.edu/international http://libguides.keuka.edu/cat.php?cid=35791 Business and Management library guides: http://libguides.keuka.edu/business REQUIRED ARTICLES Adams, K. (2006). The sources of innovation and creativity. National Center on Education and the Economy....

Words: 4220 - Pages: 17

Premium Essay

Success and Failure of Technological Process

...Success and Failure of Technological Process BMAN61001 Innovation and the Knowledge Economy ID: 9523474 1 Introduction Garud and Karnøe (2003) stated that agency in technology entrepreneurship is distributed and embedded across different kinds of actors in the networks. The aggregation of inputs from various actors (both human and nonhuman) through multiple technological paths creates a momentum that result in technological change. The study compared wind turbine industry in Denmark and U.S. with the notion of “Bricolage” versus “Breakthrough”. The aim of this essay is to examine ways in which actors engage in different levels in shaping technological path. The Social Construction of Technology (SCOT) offers a deeper understanding on a relationship among technology and society and how social factors can influence technological development, whereas the Actor Network Theory (ANT) can help to identify problems and errors in the mechanism that result in a failure of innovation. The paper falls into three main sections. First it describes SCOT and its limitation, using the historical development of bicycle to illustrate. Then, ANT is discussed together with its failure. Thereafter, the SCOT and ANT theories can help to analyze the errors in U.S wind turbine case study and limitation of the paper in Hendry and Harborne’s view. Finally, this essay concludes the main findings and future research suggestions. 10 Reference: AWEA (2014). New analysis: U.S. is world’s......

Words: 518 - Pages: 3

Premium Essay

Old Smoke

...Old Smoke In today’s society, tobacco smoke is a concern which has resulted in banning smoking in the workplace, restaurants, and recreational facilities that have sporting events. Numerous studies have found that tobacco smoke is the major contributor to indoor air pollution, and that breathing secondhand smoke is a cause of disease in healthy nonsmokers, including heart disease, stroke, respiratory disease, and lung cancer (Model Ordinance Prohibiting Smoking in all Workplaces, n.d.). A smokefree environment allows human beings to breathe air that is not polluted by cigarette smoke. This allows them to enjoy life without the second hand smoke that can cause health issues as they grow and develop in life. Explain how you would handle this situation if you were Charles Renford. It is the manager’s duty, and responsibility at a company or organization to listen to both sides of a concern in the workplace. In the case where Charles Renford’s position as a supervisor at Redwood Associates, an employee felt strong enough to complain about smoke in the work place, he should address the complaint with all employees involved directly. The odor of smoke was strong enough that Darlene, the employee came to the supervisor, Charles Renford with a complaint about the smoke in the main file room. Charles Renford reminded Darlene, “that although the law in their state requires companies to provide a smoke-free work area for employees that desire it, it doesn’t force companies......

Words: 1625 - Pages: 7

Premium Essay

Toyota Background

...[pic] DIPLOMA IN BUSINESS ADMINISTRATION DBA (3104) ( INTRODUCTION TO BUSINESS Student Name : Ng See Wei Student ID# : 0103DBA0120914FT Student IC / Passport# : 961109-10-6187 Academic Honesty Policy Statement I, __________________________ hereby confirm that this assignment is my own work and not copied or plagiarized from any source. I have referenced the sources from which information is obtained by me for this assignment. I have also not allowed anyone to copy my work. Student’s Signature : _________________________________ | |for office use only | |LECTURER’S COMMMENTS/GRADE: | | | | | | |DATE : ______________ | | | | | |TIME : ______________ | | ......

Words: 1850 - Pages: 8

Premium Essay

My Words

...Research on technology and teacher education: current status and future directions. Author: Willis, Jerry.; Thompson, Ann. Sadera, William. Source: Educational Technology Research and Development v. 47 no4 (1999) p. 29-45 ISSN: 1042-1629 Number: BEDI00000113 Copyright: The magazine publisher is the copyright holder of this article and it is reproduced with permission. Further reproduction of this article in violation of the copyright is prohibited. [pic] Much of the field we call educational technology has links that go back for almost a hundred years, at least to the museum movement in the early part of the 20th century. The museum movement and the success of training and development work during the two world wars were major factors in the development of the field. Educational technology flourished in the 1950s and continues to play an important role in many colleges of education. The particular subdiscipline of educational technology we will explore in this paper does not have a long history. Information technology and teacher education (ITTE) is now a scholarly and professional discipline, but it has only recently become so. During the 1970s and early 1980s, while most educational technology programs continued to emphasize more traditional concepts and skills such as the systematic design and development of instructional materials, a separate group of graduate programs emerged that provided some of the foundations for ITTE. These programs, usually at the master's level...

Words: 11104 - Pages: 45

Free Essay

Evidence Based Practice

...Assignment cover sheet Note: (1) The attention of students is drawn to: the Academic Regulations, the Academic Honesty Policy and the Assessment Policy, all of which are accessible viahttp://students.acu.edu.au/309246 (2) A de-identified copy of your assignment may be retained for University quality (audit) processes, benchmarking or moderation. |Student ID Number/s: |Student Surname/s: |Given name/s: | |S00158530 |Patel |Purvi | | | | | |Course:Bachelor of nursing |School:Australian catholic University | |Unit code:HLSC122 |Unit title:Inquiry in Healthcare | |Due date:30/03/2014 |Date submitted:30/03/2014 | |Lecturer-in-Charge: Joe Perry |Tutorial Group/Tutor: T, 06 | |Assignment Title and/or number: Assignment 1 ...

Words: 1854 - Pages: 8