Details of this Paper

DEVRY CCSI360 WEEK 5 YOUDECIDE

Description

solution.


Question

 

Print

 

Scenario

 

 

Scenario Summary

 

Things have been going very well since you started with the Systematix. You’ve been at it for a month and just received your 30-day performance evaluation, which included promising feedback as well as some areas to be improved upon. There is much more to be done, so let us look at your next task.

 

 

Your manager reports that the Security Operations Center (SOC) recently experienced a catastrophic network outage because of a security breach. She thinks this was ultimately caused by a breakdown of internal controls and has asked that you investigate this issue and try to determine specifically what happened.

 

 

You conduct initial research and discover that SOC is staffed 24/7/365 and in general is a high tempo, high-stress environment with a high turnover. The SOC monitors and maintains Fortune 50 networks and is critical to the success of the company. In addition, the SOC performs rule changes on customer firewalls so that customer nodes can protect data on their existing networks.

 

 

Upon initial informal discussions with both security and network administrators in the SOC, you learn that stress is high, morale is low, and there is a general lack of teamwork among the staff. You discover several cliques among the staff and also learn that each shift is only concerned about itself. In addition, security is very lax and procedures aren’t typically followed. Because of this, the SOC Director recently hired a new first-level manager in hopes of turning things around.

 

 

Your Assignment

 

You are not very familiar with network security operations, but you feel a sense of excitement about diving into this new investigation. You will need to interview key staff in order to gain insight to the outage and its cause. After your meetings are complete, you will summarize your findings by creating a written report.

 

 

KEY PLAYERS

 

 

Back to Top

 

Title/Role/Character

 

Name

 

Title

 

Race and gender

 

 

Script: Text and Audio

 

 

The character’s position, viewpoint, opposing view, and so forth is below. This text also will serve as the audio.

 

Clinton Robertson, New Manager, Black Male

 

Conference Call, Monday, 11 a.m.

 

 

“Unbelievable! I just started here last week and now this! What a way to start out. This morning, I was reprimanded by the SOC Senior Manager for this outage, which caused a major loss of business and revenue for one of our top customers. I understand things haven’t been going well in the SOC lately, but that is no excuse. The Network and Security Administrators should know their job by now!”

 

 

Lewis Braxton, SOC Shift Leader, White Male

 

Office Visit, Wednesday, 1 p.m.

 

 

“I have an idea of what happened here. A few days ago, our new manager, Clinton, asked us to be diligent when performing configuration changes. I’m thinking neither the first or second person quality checked the configuration change, which was obviously incorrect and contributed to a major outage. But I have to admit, my attitude is that whatever it takes to get the job done, just do it!”

 

 

Connie Kently, Network Administrator, Black Female

 

Office Visit, Thursday, 10:20 a.m.

 

 

“I admit that I completed the configuration change quickly because I was busy doing other things at the time. I just didn’t have time to do a quality check, so I told Allison that I checked everything. Look, I’m new here and I’m still on probation. I think the cause of the outage was because of a software flaw, not human error. Please keep in mind that I’m new and we are all overworked and understaffed. The company gives us full access to all websites. I’ve seen coworkers visiting pornographic and gambling websites and this distracts them from their work. Could you recommend to corporate that these sites be blocked?”

 

 

Allison Chang, Firewall Administrator, Asian Female

 

 

Office Visit, Thursday, 12 p.m.

 

 

“Connie told me that the change was ready to go, so I checked it, implemented it on the system, and then everything went haywire! I have a feeling that she caused this outage, because she’s always talking on the phone and instant messaging her friends. She never focuses on anything work related. If you check closely enough, I’m sure you will see that she caused this. If you need any extra ammunition, I’ll provide you with anything you need. Could electronic discovery be used to prove this?”

 

 

Betsy Provenzia, Information System Auditor, While Female

 

Office Visit, Thursday, 1 p.m.

 

 

“I completed an information system audit on this group just 60 days ago and I discovered several risks. Operations procedures weren’t always followed, configuration changes weren’t approved by the appropriate staff, and the SOC wasn’t staffed to minimum required levels on several occasions. I also observed links and images associated with hate groups in several users’ workstations. I reported my findings to the SOC Manager but not sure if he remediated the risks. I recall him saying that he’s doing everything he can but has limited resources.”

 

 

 

 

YOU DECIDE

 

 

Activity or Assignment

 

Assignment

 

Read the You Decide scenario and using the information provided, prepare a two- to three-page report (at least 300 words per page), not including the Title Page, Abstract, or References pages, using the APA format (see the APA template in Doc Sharing). Recalling the information collected during the interviews and information from the text, your report should address the following areas.

 

 

What is expected of technology staff regarding the prevention of security breaches and unethical behavior

 

The role of a supervisor and what is expected of him or her regarding the prevention and detection of security breaches, as well as his or her role in disciplining those involved with unethical behavior

 

Controlling Internet access and Internet filtering

 

CDA and COPA implications

 

Defamation and hate speech

 

Freedom versus privacy in the workplace

 

Note: It is recommended to create six sections within your paper that addresses each of the above bullet items.

 

 

Submit your assignment to the Dropbox located on the silver tab at the top of the page.

 

 

Category Points Description

 

Understanding 35

 

Demonstrate a strong grasp of the problem at hand

 

Demonstrate understanding of how the course concepts apply to the problem

 

Analysis 35

 

Apply original thought to solving the business problem

 

Apply concepts from the course material correctly toward solving the business problem

 

Execution 10

 

Communicate answers clearly and succinctly using strong organization and proper grammar

 

Adhere to the APA format (title page, abstract, page header, reference page, etc.)

 

Total 80 A quality paper will meet or exceed all of the above requirements.

 

Note!

 

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox , please click here.

 

Paper#36452 | Written in 05-Mar-2016

Price : $19
SiteLock