E-Commerce-Network Security
Describe the steps you would take to determine the needs of the organization (the discovery of the network devices)
There are various steps an organization can take to determine its needs related to the discovery of network devices. The first step that can be taken to determine the needs of the important systems within the organization can be developed by walking around the organization and creating an inventory of the most important systems within the organization. A list of organizations and documentation of the software installed to scan the organization’s network. The documentation should include things such as routers, servers, firewalls, and the distribution of switches within the organization. This can then be followed by the second step, which is developing a change control process that outlines all the changes made in the system and the parties that executed the change control process (Ortiz et al., 2019). The third phase of determining the organization’s needs is being aware of compliance standards and trying to stick by them. Some compliance standards the organization should abide by include PCI, HIPAA, and Sarbanes Oxley standards.
Observing the dependencies is the fourth step that the organization should take in determining the needs of the organization as they relate to the network devices. Using some network monitoring tools permits the organization to set the dependencies and avoid the scenario whereby the organization has to attend to a series of alarms (Ortiz et al., 2019). The fifth step is for the organization to decide the security of getting the network information. While an alert to a system indicates that the network is busy or down, the alert can be much better if it is backed up with additional information on what may be wrong. Finally, getting supplemental data is the last step that the organization should take in determining its needs. In this step, the organization should evaluate the logs and determine that the systems have enough space, capture the network traffic passing through the infrastructure, and assess the nature of files being shared from the database (Ortiz et al., 2019).
Detail the countermeasures (and tools) you would put in place.
The countermeasures that the organization can implement manifest in three major categories: physical controls, technical controls, and administrative controls. The physical controls entail implementing security measures used primarily to prevent unauthorized access in relation to sensitive material. Some physical control tools include but are not limited to security guards’ locked steel doors, thermal alarm systems, and biometrics that identify people based on their fingerprints, voices, or faces (Gibson & Igonor, 2020). Technical security controls encompass technology utilization to reduce hardware and software vulnerabilities. Some of the tools that may be used in this category include firewalls, encryption, and anti-malware software. Lastly, administrative security control outlines the policies, procedures, or guidelines that enumerate business practices following the organization’s security goals (Gibson & Igonor, 2020). An example is a security policy that specifies users’ conduct within the organization’s premises.
References
Gibson, D., & Igonor, A. (2020). Managing risk in information systems. Jones & Bartlett Learning.
Ortiz, J., Crawford, C., & Le, F. (2019, April). DeviceMien: network device behavior modeling for identifying unknown IoT devices. In Proceedings of the International Conference on Internet of Things Design and Implementation (pp. 106-117).
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Book url: https://online.vitalsource.com/reader/books/9781284107753/epubcfi/6/26[%3Bvnd.vst.idref%3Dch13]!/4/146/2/4
Please complete the scenario below following these guidelines for your deliverable.
Your assignment must be a minimum of 1 page double-spaced, plus a title page and a reference page for a total of 4 pages.
Make sure you are using at least two (2) academic references.
This submission should be created following APA 6th edition guidelines.
The paper is to follow the APA style guide, Sixth Edition (available via bookstores).
Also, refer to APA’s online resources
and the APUS website
Submit your assignment as an MS Word attachment.
You will be required to run your paper through Turnitin.com, ensure that your similarity index is sufficiently low, and submit an originality report with your paper.
Scenario:
You have been hired as a consultant to secure all network devices for a large firm.
1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices)
2. Detail the countermeasures (and tools) you would put in place.
*******(Note: You are not limited to following the steps/countermeasures described in your textbook. If there are additional steps you would take, please list them and explain why you are taking them.)