IT Security and Decision Making – You Decide Activity custom essay

[meteor_slideshow slideshow=”arp1″]

Read the YOU DECIDE scenario and using the simulation information, prepare a 2 to 3-page report (at least 300 words per page) using the APA format (see Doc Sharing ?APA – Template in 5th Edition? for help) and discuss how you would go about determining the cause of the breach and in addition, identify any ethical issues that you could encounter during the investigation. Be sure to include the following:

1. The role of the network administrator and what is expected of her in regards to prevention of security breaches and unethical behavior.
2. The role of the supervisor and what is expected of him/her in regards to the prevention, detection and discipline of security breaches and unethical behavior.
3. Any breaches of confidentiality that occurred.
4. Tools/resources that could be used to help determine the cause of the breach.

SCENARIO:
Things have been going very well since you started with the company. You?ve been at it for a full month now and just received your 30-day performance evaluation, which included a lot of great feedback as well as a little constructive coaching! However, there is much to be done so let us look at your next task.

Your Manager reports that the Security Operations Center (SOC) recently experienced a catastrophic network outage due to a security breach. She thinks this was ultimately caused by a breakdown of ?internal? controls, and has asked that you investigate this issue and try to determine specifically what happened.

You conduct initial research and find out that the Security Operations Center is manned 24x7x365 and in general, is a high tempo, high stress environment with fairly high turnover. The SOC monitors and maintains several Fortune-50 networks and is critical to the success of the organization. In addition, the SOC performs rule changes on customer firewalls so that customer nodes can protect data on their existing networks.

Upon initial informal discussions with both Security and Network Administrators in the SOC, you learn that stress is high, morale is low, and there is a general lack of teamwork among the staff. You discover several cliques among the staff and also learn that each shift is only concerned about itself. In addition, you security is very lax and procedures aren?t being followed. Because of this, the SOC Director recently hired a new first-level Manager in hopes of turning things around.

YOUR ROLE:
You are not too familiar with network security operations, but you feel a sense of excitement about diving into this investigation. You will need to individually interview key staff in order to get a clear picture of the story.

KEY PLAYERS:
1. Clinton Robertson, New Manager
?Wow. I just started here last week and now this happened! What a way to start out. This morning, I was chewed out by the SOC Senior Manager for this outage, which caused a major loss of business and revenue for one of our top customers. I know things haven?t been going good in the SOC lately, but that is no excuse. The Network and Security Administrators should know their job by now!?

2. Lewis Braxton, SOC Shift Leader
?I have an idea of what happened here. A few days ago, our new Manager, Clinton, asked us to use the ?four eye? principle when doing firewall change requests, in order to ensure that both the person doing the change and a second person quality check the firewall change. I?m thinking that neither the first or second person quality checked the change, which was obviously incorrect and contributed to a major outage. But I have to admit, my attitude is to whatever it takes to get the job done, just do it right!?

3. Connie Kently, Network Administrator
?I admit that I did the change quickly because I was busy doing other things. I just didn?t have time to do a quality check, but I never make mistakes, so I told Allison that I checked it and it was ready to go. Look, I?m new here and I?m still on probation. I think it was a software flaw or something, not human error. Please keep in mind that I?m new and we are all overworked and understaffed. It would be nice if this outage was the result of a software or system malfunction.?

4. Allison Chang, Security Administrator
?Connie told me that the change was ready to go, so I checked it, implemented it on the system, then everything went haywire! I have a feeling that she caused this outage because she?s always talking on the phone and IM?ing her friends. She never focuses on anything work-related. If you check closely enough, I?m sure you will see that she caused this. If you need any ?extra? ammunition, I?ll provide you with anything you need.?

5. Betsy Provenzia, Information System Auditor
?I completed an information system audit on this group just 60 days ago and I found a few issues. Operations procedures weren?t always followed, firewall changes weren?t approved by the appropriate staff, and the SOC wasn?t staffed to minimum required levels on several occasions. I reported my findings to the SOC Manager, but not sure if he followed up. I remember him saying that he?s doing everything he can but only has so much to work with.?

Place your order of custom research paper With us NOW. The assignment will be written from scratch by our qualified and experienced writers.

[meteor_slideshow slideshow=”arp2″]

A-Research-Paper.com is committed to deliver a custom paper/essay which is 100% original and deliver it within the deadline. Place your custom order with us and experience the different; You are guaranteed; value for your money and a premium paper which meets your expectations, 24/7 customer support and communication with your writer. Order Now

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]