Details of this Paper

DEVRY CCSI360 WEEK 5 YOUDECIDE

Description

solution


Question

Question;PrintScenarioScenario SummaryThings have been going very well since you started with the Systematix. You?ve been at it for a month and just received your 30-day performance evaluation, which included promising feedback as well as some areas to be improved upon. There is much more to be done, so let us look at your next task.Your manager reports that the Security Operations Center (SOC) recently experienced a catastrophic network outage because of a security breach. She thinks this was ultimately caused by a breakdown of internal controls and has asked that you investigate this issue and try to determine specifically what happened.You conduct initial research and discover that SOC is staffed 24/7/365 and in general is a high tempo, high-stress environment with a high turnover. The SOC monitors and maintains Fortune 50 networks and is critical to the success of the company. In addition, the SOC performs rule changes on customer firewalls so that customer nodes can protect data on their existing networks.Upon initial informal discussions with both security and network administrators in the SOC, you learn that stress is high, morale is low, and there is a general lack of teamwork among the staff. You discover several cliques among the staff and also learn that each shift is only concerned about itself. In addition, security is very lax and procedures aren?t typically followed. Because of this, the SOC Director recently hired a new first-level manager in hopes of turning things around.Your AssignmentYou are not very familiar with network security operations, but you feel a sense of excitement about diving into this new investigation. You will need to interview key staff in order to gain insight to the outage and its cause. After your meetings are complete, you will summarize your findings by creating a written report.KEY PLAYERSBack to TopTitle/Role/CharacterName Title Race and genderScript: Text and AudioThe character?s position, viewpoint, opposing view, and so forth is below. This text also will serve as the audio.Clinton Robertson, New Manager, Black MaleConference Call, Monday, 11 a.m.?Unbelievable! I just started here last week and now this! What a way to start out. This morning, I was reprimanded by the SOC Senior Manager for this outage, which caused a major loss of business and revenue for one of our top customers. I understand things haven?t been going well in the SOC lately, but that is no excuse. The Network and Security Administrators should know their job by now!?Lewis Braxton, SOC Shift Leader, White MaleOffice Visit, Wednesday, 1 p.m.?I have an idea of what happened here. A few days ago, our new manager, Clinton, asked us to be diligent when performing configuration changes. I?m thinking neither the first or second person quality checked the configuration change, which was obviously incorrect and contributed to a major outage. But I have to admit, my attitude is that whatever it takes to get the job done, just do it!?Connie Kently, Network Administrator, Black FemaleOffice Visit, Thursday, 10:20 a.m.?I admit that I completed the configuration change quickly because I was busy doing other things at the time. I just didn?t have time to do a quality check, so I told Allison that I checked everything. Look, I?m new here and I?m still on probation. I think the cause of the outage was because of a software flaw, not human error. Please keep in mind that I?m new and we are all overworked and understaffed. The company gives us full access to all websites. I?ve seen coworkers visiting pornographic and gambling websites and this distracts them from their work. Could you recommend to corporate that these sites be blocked??Allison Chang, Firewall Administrator, Asian FemaleOffice Visit, Thursday, 12 p.m.?Connie told me that the change was ready to go, so I checked it, implemented it on the system, and then everything went haywire! I have a feeling that she caused this outage, because she?s always talking on the phone and instant messaging her friends. She never focuses on anything work related. If you check closely enough, I?m sure you will see that she caused this. If you need any extra ammunition, I?ll provide you with anything you need. Could electronic discovery be used to prove this??Betsy Provenzia, Information System Auditor, While FemaleOffice Visit, Thursday, 1 p.m.?I completed an information system audit on this group just 60 days ago and I discovered several risks. Operations procedures weren?t always followed, configuration changes weren?t approved by the appropriate staff, and the SOC wasn?t staffed to minimum required levels on several occasions. I also observed links and images associated with hate groups in several users? workstations. I reported my findings to the SOC Manager but not sure if he remediated the risks. I recall him saying that he?s doing everything he can but has limited resources.?YOU DECIDEActivity or AssignmentAssignmentRead the You Decide scenario and using the information provided, prepare a two- to three-page report (at least 300 words per page), not including the Title Page, Abstract, or References pages, using the APA format (see the APA template in Doc Sharing). Recalling the information collected during the interviews and information from the text, your report should address the following areas.What is expected of technology staff regarding the prevention of security breaches and unethical behaviorThe role of a supervisor and what is expected of him or her regarding the prevention and detection of security breaches, as well as his or her role in disciplining those involved with unethical behaviorControlling Internet access and Internet filteringCDA and COPA implicationsDefamation and hate speechFreedom versus privacy in the workplaceNote: It is recommended to create six sections within your paper that addresses each of the above bullet items.Submit your assignment to the Dropbox located on the silver tab at the top of the page.CategoryPointsDescriptionUnderstanding35Demonstrate a strong grasp of the problem at handDemonstrate understanding of how the course concepts apply to the problemAnalysis35Apply original thought to solving the business problemApply concepts from the course material correctly toward solving the business problemExecution10Communicate answers clearly and succinctly using strong organization and proper grammarAdhere to the APA format (title page, abstract, page header, reference page, etc.)Total80A quality paper will meet or exceed all of the above requirements.Note!Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, please click here.See the Syllabus s

 

Paper#36371 | Written in 18-Jul-2015

Price : $28
SiteLock