Security Proposal
Since the system in question is a military base, the information that is collected and used, there must be considered as a very vital aspect of the business and must be protected at all costs. To develop the right system for the Creech Air Force Base, there must be three significant considerations; the technology in use, the stakeholders of the system, and its business process. At the moment, the most common methods of attacks employed by cyber terrorists are those focusing on the network (Azhibayev, & Dzhanadilov, 2018). These attacks include denial of service, malware, masquerading, and packet sniffer, amongst others. These attacks are mainly passed through the internet and use vulnerabilities that exist in installed software.
When it comes to technology, the networks and the machines used should be as in-house as possible. The main storage of the military information will be servers that are either within or without the basis. The reason for not going for outsourcers of cloud computing, for instance, is because of the risk that exists when that information gets into the wrong hands. The layout of the system should be designed such that it recognizes the different models of attack, which are common and well known (Mehan, 2014). The models of attack are then recorded and instantiated, after which it accesses a matrix of decision support. It is from this matrix that a possible solution will be produced and presented to the system’s users. From these choices, a person using the system will, thus, be able to do what will protect it easily and effectively.
The organization should also be able to purchase controls that will effectively protect the system’s fundamental existence. Although these controls might appear to be too basic, it is important to note that they are important for eliminating the most likely and dangerous levels of attacks (Mehan, 2014). In most military organizations, such controls are effected through management, which uses processes, rules, and standards that help with permanent implementation. After applying these controls and learning the relevant processes, it becomes easy to keep out all the unwanted access from unauthorized individuals (Azhibayev & Dzhanadilov, 2018). The idea of such a system is to ensure that it can be improved by collecting and analysis of successful security controls and improving them. The chances are that any newer forms of attack will only slightly deviate from the models that have existed for a long time. These changes should always be noticed and stopped immediately.
When it comes to managing the stakeholders and the business process, the company must be ready to operate on a framework that keeps the people vigilant and at the top of their game. It is best to have several principles to use to ensure the activities in question involve the best framework at the time. The principles include the economy of force, where the framework implemented is designed to protect the greatest number of attacks and their effects (Rajagopal & Behl, 2017). In this framework, any party that is unnecessary in the system will be logged off so that there is a maximum concentration of resources on guard. This also reduces the points of vulnerability in the system. Another framework is known as the unity of command, where planning should ensure the management comes together during such attacks and the sight of implementation, planning, and control is cohesive and agreed to by those involved.
References
Azhibayev, M. G., & Dzhanadilov, O. M. (2018). Cybercrime as a modern threat to military security. Journal of Advanced Research in Law and Economics, 9(5 (35)), 1551-1557.
Mehan, J. (2014). CyberWar, CyberTerror, CyberCrime and CyberActivism: An i-depth guide to the role of standards in the cybersecurity environment. IT Governance Publishing.
Rajagopal, ., & Behl, R. (2017). Business analytics and cyber security management in organizations.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Proposal for implementing IT Security Management
Utilizing your comprehensive Security plan outline, develop a proposal for implementing IT Security Management. Upload the assignment in Microsoft Word format for grading.
This is a Week 2 partial project of a 8 week project, where the week one was the initial outline and subject of the project.
It is ok to add more details that may not be into the week one outline, as long as they are fit to the subject week 1.