It 380 Final Milestone Cyberleet Technologies Research Paper
Essay Preview: It 380 Final Milestone Cyberleet Technologies Research Paper
Report this essay
[pic 6][pic 7][pic 8]MANUAL OVERVIEW 4SECTION 1: INTRODUCTION: WELCOME TO CYBERLEET 51.1 Introduction 51.2 Your Role at CyberLeet 51.3 Purpose of This Manual 6SECTION 2: CORE TENETS OF CYBERSECURITY 72.1 Confidentiality 72.2 Integrity 72.3 Availability 8SECTION 3: CYBERSECURITY POLICIES 93.1 Password Policies 93.2 Acceptable Use Policies 93.3 User Training Policies 103.4 Basic User Policies 10SECTION 4: THREAT MITIGATION SCENARIOS 114.1 Theft 114.2 Malware 114.3 Your Choice 12SECTION 5: REFERENCES 13MANUAL OVERVIEWYou are the training manager at CyberLeet Technologies, a midsized firm that provides cybersecurity services to other businesses. CyberLeet’s core customer base is sole proprietorships and other mom-and-pop shops that are too small to have their own IT departments and budgets. Generally speaking, your clients have a reasonably high risk tolerance, and put a premium on the functionality of their IT systems over stringent security measures. However, you also have clients that must protect highly sensitive information in order to continue operating successfully. For example, CyberLeet supports a few small public-accounting firms that need to maintain important tax-related information, as well as several day-care businesses that must keep children’s health records private while allowing necessary access for certain caregivers. In the past year, CyberLeet has experienced rapid growth, which means you can no longer personally provide one-on-one training to every new information security analyst as they are hired. Therefore, you have decided to create a training manual that will explain to the current and future cohorts of new hires the essential principles and practices that they must understand in order to be successful in their role as information security analysts at CyberLeet. Manual LayoutThere are four sections in the manual, which cover all the components of a new employee training manual. As the training manager, you must complete each section using information you learned in this course. Refer to the background information on CyberLeet and apply the appropriate information that best matches based on the size of the company, the value of cybersecurity, and its core tenets. Apply best practices of cybersecurity principles for addressing the common threat scenarios of a sole proprietary business. The main sections of the manual you are responsible for completing are the following:
IntroductionCore tenets of cybersecurityDeveloping cybersecurity policiesThreat mitigation scenariosIn Section One, describe the organization. Provide a short history of the company, define the way it operates, and describe its place within the industry and the community it serves. Follow the prompts to complete each section. All prompts should be deleted prior to submitting this section. SECTION 1: Introduction: Welcome to CyberLeet1.1 IntroductionAny kind of companies, big or small the internet is crucial for their business, from communicating with their customers, colleagues and/or partners around the world, to carrying out transactions and new contracts, to submitting payroll for their employees, the internet is vital for the success of a business. Nevertheless, it does come with its risks, with the advancement of technology we have a rise on cybercrime, who can bypass all security measures and the need to be able to stay on top of installing ant-virus or security software updates, staying on the know on the latest threats is crucial to deter determined cybercriminals. By having a business connected to the web at all time, CyberLeet Technologies must be at the forefront of security and be able to deal with threats and assets, communication, and enhance secure collaboration to all our clients. For ant company, there is no room for errors, a breach can be costly, time-consuming and it can even cause a business to fail. We must always keep in mind, data is the vehicle that drives all business, and the security of data is fundamental to the success of a business. In a Forbes article written in 2017 by Nick Eubanks he stated, “It’s estimated that cybercrime will cost approximately $6 trillion per year on average through 2021. That’s a massive figure, one that is almost impossible for most people to imagine. But more concerning than the number itself is what it means for modern businesses. And this year, in digital form, so it should come as no surprise that market perception is directly linked to how company security is managed” (Eubanks, 2017). It is our duty as part of CyberLeet Technologies to protect our client of any cyber threats. 1.2 Your Role at CyberLeetCyber-attacks have been on an increase around the world, with hackers and other cybercriminals affecting businesses large and small, their mission is to take valuable information and/or bring computer networks to a standstill. Information security analysts are an asset, their ability to protect an organization’s data and information from such attacks is vital.Main job duties are planning and implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up-to-date on the latest intelligence, including hackers’ methodologies, to anticipate security breaches. They also are responsible for preventing data loss and service interruptions by researching new technologies that will effectively protect a network.Additional duties may include:Initiating, testing and executing network disaster recovery plansPresenting risk assessments and analyzing data processing systemsSetting up firewalls, data encryption and any additional security proceduresAdvising any security enhancements and purchases needed (New England College, 2017)