Question

In: Computer Science

An organization’s success begins with building a strong, secure infrastructure, which includes the appropriate policies, procedures,...

An organization’s success begins with building a strong, secure infrastructure, which includes the appropriate policies, procedures, and processes, as well as architecting a scaleable, available, and secure network.

Describe the critical components of a cybersecurity architecture. Be sure it provides defense to protect the organization’s data, network, and assets.

Explain the function of each component and how each protects the organization.

Respond to the following in a minimum of 175 words:

Solutions

Expert Solution

Critical components of cybersecurity architecture:

  1. Data Protection:

Analyzing the types of data that we typically work with and formulizing ways to protect them. With the help of governance and regulation frameworks published in public and private domains could help by providing several of the tactical advice to protect different facets of critical data.

Some time data miss-handling might pose a threat to the data security and establishing clear development and training plans related to data handling and management could go a long way.

  1. Monitoring Threat:
  1. Always on tracking: using firewall at IP Layers.
  2. Near miss analysis: having a robust analyzing mechanism for close calls of security breaches, they could be the door through which hackers could breakthrough next time.

  1. Network Perimeter fencing:

With the age of cloud computing the scope of data access and storage has crossed boundaries and organization knowledge of the state in which their data is kept in ever so important.

Sub elements to this would be:

  1. User Access: clearly defining the access roles for any data and network location, through logins, session management and multifactored authentication.
  2. Have an in-depth diagnostic from the cloud providers: An organization should ask for a complete suite of network monitoring over their cloud implementation.

  1. Threat Gathering:
  1. Hunting: some advance systems could proactively hunt for threat based on the data collected from different sources about recent attacks and happening across the globe.
  2. Operational Intelligence: is designed to provide specialized, technically-focused intuition that will guide the support, response, and remediation of specific incidents. This type of intelligence is often including, things like post-incident forensic reports.
  3. Decisive intelligence: assesses disparate pieces of information that informs organizational stakeholders on broad or long-term issues and provides a timely warning of threats.

  1. Compliance:
  1. Forensic Reporting: during the event of a breach, we need to make sure that both your organization and external auditors can view detailed activity reports to get a better picture of the cyber “chained attacks”.
  2. Response: In compliance and risk management, it’s not related just about keeping malicious entities out. If an incident does occur, we need to have a response plan that’s in compliance and in alignment with recognized regulatory framework. Each employee should know exactly what to do in the event of a breach


Related Solutions

In which of the following cases would it not be appropriate to use ?t procedures to...
In which of the following cases would it not be appropriate to use ?t procedures to make inferences about ?μ using ?¯x¯ ? We have a sample of size ?=20 and x has a right‑skewed distribution with an outlier. We have a sample of size ?=8 and x has a Normal distribution. We have a sample of size ?=60 and x has a right‑skewed distribution with no outliers. We have a sample of size ?=20 and x has a Normal...
Your current infrastructure includes an internet connection, which is connected to the ISP Router, connected to...
Your current infrastructure includes an internet connection, which is connected to the ISP Router, connected to the firewall, connected to the network switch. Within the network you have an online store, a web server that provides internet information for employees only as well a file server that is used to save pet pictures of customers. More Information -Online Store – HP Procurve server – average transactions completed – 1500 per day. -Web Server – Dell EMC server - Portal server...
16. Which one of the following procedures would not be appropriate for the auditors when they...
16. Which one of the following procedures would not be appropriate for the auditors when they observe client's physical inventory-taking? A) Confirmation of goods in the hands of public warehouses. B) Supervising the taking of the annual physical inventory. C) Reviewing client’s inventory-taking plan. D) Taking random samples to perform test counts. 17. A client's physical count of inventories was lower than the inventory quantities shown in its perpetual records (accounting records under the perpetual inventory system). This situation could...
Imagine you are CEO of a local hospital. Which policies and procedures would you develop and...
Imagine you are CEO of a local hospital. Which policies and procedures would you develop and deploy in order to facilitate superior strategy execution? Natalie and Vinnie own the Mississippi River Brewing Company, a craft brewer and taproom in New Orleans. What actions could the partners take to realize full value from TQM or Six Sigma initiatives and promote a culture of operating excellence?
Imagine you are CEO of a local hospital. Which policies and procedures would you develop and...
Imagine you are CEO of a local hospital. Which policies and procedures would you develop and deploy in order to facilitate superior strategy execution?
Explain which of the following indicators would be appropriate for a weak acid-strong base titration?
  1) A pH meter is standardized at what three pHs?   2) The initial pH of the acetic acid-NaOH titration curve was _________. 3) Explain which of the following indicators would be appropriate for a weak acid-strong base titration? Indicator pH of color change Bromcresol green 3.8 - 5.4 Bromothymol blue 6.0 - 7.6 Phenolphthalein 8.0 - 9.6
Determine which inference procedures we studied in Chapters 20-23 are appropriate for an- alyzing the following...
Determine which inference procedures we studied in Chapters 20-23 are appropriate for an- alyzing the following situations, and justify your answer (for example, ‘I’d use a two sample confidence interval for comparison of means because...’). You don’t need to carry out any of the procedures. (a) How seriously do people view speeding in comparison with other annoying behaviors? A large random sample of adults was asked to rate a number of behaviors on a scale of 1 (no problem at...
Which property of secure hash functions—one-way, weak collision-resitance, or strong collision-resistance—make them useful in the context...
Which property of secure hash functions—one-way, weak collision-resitance, or strong collision-resistance—make them useful in the context of password security? What is a password dictionary? Can it be used to improve password security? What is the motivation for limiting the password age? In particular, why would you enforce a maximum age? Why would you want to set a minimum age?
1-Which of the following increases the potential for self-control? Enforcing authority, policies, procedures, job descriptions, budgets,...
1-Which of the following increases the potential for self-control? Enforcing authority, policies, procedures, job descriptions, budgets, and day-to-day supervision to make sure that people act in harmony with organizational interests Ensuring participative organizational cultures in which everyone treats each other with respect and consideration Preparing budgets for personnel, equipment, travel expenses, and the like to keep behavior targeted within set limits Influencing behavior through norms and expectations set by the organizational culture Harnessing the power of group cohesiveness and collective...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT