Cyber Security Program Maintenance: ABC Software, Inc. Analysis Report

Verified

Added on  2022/11/28

|5
|718
|491
Report
AI Summary
This report provides a comprehensive analysis of cyber security program maintenance for ABC Software, Inc. It outlines procedures for tracking performance, including setting goals, measuring performance, and gathering feedback from the security team. The report details methods for monitoring and improving operational processes, identifying new threats and vulnerabilities through scanning and risk assessment, and obtaining feedback on policy effectiveness. Additionally, it covers the implementation of technical tools for monitoring both the internal and external environments, such as research tools, SIEM, and web proxies. The report also addresses budget allocation procedures, including budget requests, negotiations, and appropriations, as well as steps to prevent and address oversights. The report is well-structured and includes references to support the analysis.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY
CYBER SECURITY
Name of the student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY
Cyber security program maintenance:
Executive level support:
The cyber security program includes the study about the tools and the systems which
are used for monitoring and preventing of the threats. For the maintenance of the Cyber
security program of the ABC software, Inc., the organisation needs to do the following:
a. Procedures to track performance:
In order to successfully track the performances of the security service certain things
are to be followed:
i. The goals and expectations are to be set (Ding et al., 2018)
ii. Short-term measurements and long-term measurements are to be measured
iii. Go backward to compare the current performance with the current performance
iv. Checking must be done very often
v. Measurement should be done in a smarter way
vi. The bottom lines should be checked
vii. The suggestions from the security service team is to be gathered.
b. Procedures to monitor and measure performance for areas of improvement
In case of monitoring the performance and for the improvement if required certain
steps are to be followed:
i. The operative performance are to be measured (Ahlan, Lubis & Lubis, 2015)
ii. The improvements for the operational process are to be implemented
iii. The related data are to be collected
iv. The collected information are to be analysed
v. The employees related to the service are to be engaged
Document Page
CYBER SECURITY
vi. Communication channels and various strategies are to be established
vii. Implementations of new protocols and new workflows are to be done
c. Procedures to identify new threats, vulnerabilities, or any countermeasures
In case of identifying new threats certain steps are to be followed:
i. Understanding of the common attacks (Meloy et al., 2015)
ii. Inverting of the vulnerabilities
iii. Scanning tools for checking vulnerabilities
iv. Risk assessment
d. Procedures to obtain feedback on the effectiveness of policies
In order to obtain the feedbacks about the effectiveness of the policies certain
feedbacks are to be gathered:
i. Employee records
ii. Supervisor for gaining in time feedbacks
iii. Department wise feedback is also to be gathered
iv. The feedback history is also to be viewed
e. Procedures and technical tools to monitor the internal and external environment
Certain tools and procedures are there to monitor the internal environment and
external environment in case of the cyber security maintenance
i. Implementation of research tool
ii. An event management and security information (SIEM) are used frequently
iii. The provider of threat intelligence
iv. The analysis framework of network traffic
v. Disassembler is also used
vi. Implementation of Web Proxy
Document Page
CYBER SECURITY
vii. The platform of Cyber security
Budget allocation:
It is defined as a financial plan for estimating the revenues and the expenditures for a
particular period of time (Boutilier & Lu, 2016). The budget allocation of the ABC software,
Inc. is as follows:
a. Procedures for budget allocation
The procedure for the allocation of budget is dependent on the following steps:
i. Budget request
ii. Budget negotiations
iii. Budget resolution
iv. Budget appropriations
b. Procedures to catch any oversights
In case to catch up any oversight certain steps are to be followed:
i. Identification of the risks
ii. The design for preventing of the risks and for implementing of the controls
iii. Monitor the effectiveness and report the effectiveness for the controls
iv. Solving of the complaint difficulties when they occur
v. Advising and also training
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY
References:
Ahlan, A. R., Lubis, M., & Lubis, A. R. (2015). Information security awareness at the
knowledge-based institution: its antecedents and measures. Procedia Computer
Science, 72, 361-373.
Boutilier, C., & Lu, T. (2016). Budget allocation using weakly coupled, constrained Markov
decision processes.
Ding, D., Han, Q. L., Xiang, Y., Ge, X., & Zhang, X. M. (2018). A survey on security control
and attack detection for industrial cyber-physical systems. Neurocomputing, 275,
1674-1683.
Meloy, J. R., Mohandie, K., Knoll, J. L., & Hoffmann, J. (2015). The concept of
identification in threat assessment. Behavioral Sciences & the Law, 33(2-3), 213-237.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]