Continuous Monitoring Plan Research Paper

PAGES
2
WORDS
657
Cite

¶ … Monitoring Plan Our organization is in the most advanced level: I will consider a wide variety of commercial and custom monitoring tools to handle the individual aspects of continuous monitoring. As the Chief Information Security Officer, I will purchase next generation firewalls, advanced intrusion prevention, security information management (SIM) and advanced log management systems to consolidate feeds into the alerting systems and monitoring dashboard (Fry & Martin, 2009). The SIM will be able to offer high-level threat by pulling information from asset information bases, financial systems of document classification systems. From the drawing, the organization will also combine monitoring capabilities on its own, by using open source, commercial and home-developed programs. All these continuous monitoring efforts will result in an improved situational awareness of users, systems, and activities. It will also foster a better awareness of attacks being attempted on the networks regardless of their best pro-active efforts.

I will integrate the security systems of the organization for continuous...

...

As the head of security, my collaboration with the operations team will be helpful in identifying the detective and proactive security data sets valuable to our monitoring efforts. The most time consuming part in integrating this network-monitoring piece will be the business logic. I will choose a vendor for analyzing data and data modeling to assist in the business logic development and integration (Broad, 2013). However, the IT staff will still need to customize these risk priorities and standard alerts based on our unique business needs. I will seek identify and understand the uses of the systems by working with various engineers and business units.
I will integrate all organization's reporting systems through the log management ground for correlation and normalization instead of having them exist as individual silos. Then, I will integrate the results into our situational awareness dashboard for full reporting and analysis. By heavily leveraging policies and by using self-developed policies within our management systems and commercial monitoring, I will integrate real time alerts from the…

Sources Used in Documents:

References

Broad, J. (2013). Risk management framework: A lab-based approach to securing information systems. Amsterdam: Syngress, an imprint of Elsevier.

Fry, C. & Martin, N. (2009). Security Monitoring. Sebastopol, Calif: O'Reilly Media, Inc., 2009. Internet resource.


Cite this Document:

"Continuous Monitoring Plan" (2013, November 08) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/continuous-monitoring-plan-126599

"Continuous Monitoring Plan" 08 November 2013. Web.18 April. 2024. <
https://www.paperdue.com/essay/continuous-monitoring-plan-126599>

"Continuous Monitoring Plan", 08 November 2013, Accessed.18 April. 2024,
https://www.paperdue.com/essay/continuous-monitoring-plan-126599

Related Documents

Moreover, the Center for Internet Security (CIS) has tools to identify configuration weakness. Nessus could also be used to scan for security vulnerabilities. Identification of vulnerability will require a corporate organization to make a decision to implement changes for the email server to enhance an effective corporate network system. Process to Implement the Decision Process to implement the decision is to set aside both financial and human resources. Organizations should set

Business Plan for a Sleep
PAGES 30 WORDS 8375

Offered under the same roof are "consultative, diagnostic, and treatment services" which are stated to be provided "by board-certified practitioners in the fields of pulmonary medicine, otolarngology, family medicine and more." (2006) Smith reports that the laboratories experiencing the most dramatic growth are two which are located the "farthest from the Hillsboro flagship" as they are located in two areas that were "formerly underserved." (2006) Smith additionally reports that the

Basic message of the health education outreach: The group will promote methods of preventing contraction of HIV and the benefits of undergoing HIV testing and counseling. Rationale for basic health message: Given that incidence of HIV / AIDS among the Latino communities is very high, it will be imperative to promote methods of prevention and early HIV testing and counseling. Methods of outreach to the community for participation: Tapping of different community

AbstractRemote patient monitoring devices have become more convenient and effective in administering health care in the US. The technique is of great value for the patients and the healthcare practitioners as it appears to focus majorly on reducing healthcare costs by use of technology. However, one of the challenges with the current Remote Patient Monitoring technology is the unapproved accuracy of the devices used. Recently, at least five Remote patient

Development PlanIntroductionAs an educator, continuous reflection on my professional skills, disposition, and teaching practices is crucial for my growth and effectiveness. If I can consistently evaluate my strengths and areas for improvement, I can develop action plans to enhance my competencies and better serve my students. In the following sections, I reflect on three key domains that are essential to my role as a teacher: professional dispositions, NBPTS Core Propositions,

Problem/Solution Report on Ergonomic Office FurnitureAbstractThis report aims to address the pressing issue of non-ergonomic office furniture in our workplace. The lack of ergonomic design has been linked to various health issues among employees, affecting productivity and incurring additional costs. After evaluating multiple solutions, the report recommends a phased implementation of ergonomic furniture, supported by evidence from authoritative sources.The ProblemThe modern workplace has evolved significantly over the past few decades,