Project 1: Evaluation of Managed Security Services for Organizations

Verified

Added on  2022/11/29

|6
|1712
|286
Project
AI Summary
This project focuses on the development and implementation of managed security services within organizations to safeguard against malware attacks and other security threats. It begins with an introduction emphasizing the critical role of service security in protecting information and ensuring smooth operations. The literature review explores the benefits of managed security services, including expertise, reduced workload, and comprehensive security coverage through third-party providers, often leveraging cloud technology. It highlights the importance of proactive security measures, the growing number of cyber threats, and the need for organizations to prioritize IT security. The project outlines a project plan with activities, durations, and timelines, culminating in a conclusion that reinforces the value of managed security services in preventing data breaches and cyberattacks, thereby enabling organizations to focus on core business activities. The references cited support the project's findings and recommendations.
Document Page
Running head: PROJECT-1
PROJECT 1
Name of the Student
Name of the Organization
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1PROJECT-1
Introduction
The main aim of the project is to define the organization’s service security by developing
managed services of security as there are very high chances of malware attack or other security issues
within the organizations. Security of the services is very much important for keeping information
protected and this also essential for the overall health of the services within the organization and in
preventing them from viruses and allows all the services to run smoothly. Most of the organizations are
turning up for managing services of security for gaining the expertise of security as well as in lessening
the workload of their particular security staff within the organization. Therefore, it is very much
important to build up a service security plan for the organization.
Literature Review
All the providers belonging to the third party mostly offers managed services of security for both
the oversight as well as the administration of the security processes of the company. A managed service
provider of security helps in conducting services either within the organization or rather remotely,
typically with the help of cloud. It will help in providing broad range of the services of security from set
up of the infrastructure with the help of management of security or response to any incident. Some of
the service providers of managed security mainly specializes in some areas while some others are
offering total outsourcing of the information security program of the enterprise. Hence, it is very much
important to hire for a managed service provider for security. All processes of security are to be
managed and this will be helping a lot in conducting business with a minimal intrusion due to the
initiatives of security [2]. A constant line of sharing of information as well as a reporting which is
seamless must be maintained for developing organizational services security. The enterprise IT must
always be up to date with status related to issues regarding security as well as maintenance. This will
help in enabling the organization for focusing upon the governance of security rather than several tasks
of administration. Broad range of security services are to be provided starting from the outsourcing of
the programs of security to all the services which are specialized and this will finally help in focusing on
the specific component of the security of the enterprise [3]. By security outsourcing, enterprises will be
able to realise all the savings of cost by the elimination of the requirement for maintaining a totally
staffed and on-site security department of IT.
Despite an awareness which is increasing the requirement for all the proactive measures,
several organizations are continuing for putting off the implementation of all the security initiatives of
Document Page
2PROJECT-1
sound till they are suffering a huge loss as a result of a breach of data. The huge number of cyber threats
is seen to be growing to a great extent and it has become very much crucial for all the organizations to
prioritize the security of IT as final result [9]. If any organization is seen to be lacking in the maturity of
security program or rather if it is wanting for an expansion of the capabilities of security, managed
providers of security service forms a valuable option. Cyber-attacks have been seen to have evolved at a
very fast pace incredibly and this has ultimately led to one threat after the other [10]. Without the help
of appropriate tools of security as well as resources, keeping up with all kinds of threats which are
evolving, addressing of the threats as they are seen to have been arising and lastly the recovery from
several incidents which are detected later may even consume several resources which are substantial.
Hence, several operations are to be taken and main focus must be upon the monitoring of threat [1].
This will be helping a lot in gaining advantages over organizations with a core function of business. The
organization must specialise themself with an early detection of threat as well as protection for focusing
upon the core activities of business while leaving several concerns of security for the experts [4]. A
managed services of security must be maintained which will help in conducting vulnerability as well as
penetration testing. It will even help in performing several security scan based upon a particular routine
and even take care of some other management functions of security for any particular enterprise by just
freeing up the IT of the enterprise for shifting their main focus to the oversight of the program of
security and some other activities which mostly advances several goals of the enterprise [6].
The network security of the computers comprises of several measures which are taken by any
kind of business organization for both monitoring as well as preventing any kind of unauthorised access
or rather misuse of the network of any system as well as its resources. The management of the security
of computer network have a number of needs which mainly depends upon both the size as well as the
physical setting of the computer network [5]. Any access to information as well as programs upon the
network must be controlled by an administrator of the network who will be assigning a unique ID as well
as password or some other authenticating information for ensuring that they are totally authorised for
conducting both communications as well as transactions across the entire network[8]. There are a
number of ways for improving the security of the computer network. Assigning of several usernames
which are unique as well as passwords are considered as one of the simplest way for the protection of
the resource of network. The network security of network will be commonly using several extra
measures of security like the establishment of a firewall, installation of an antivirus software and setting
of strong passwords on the networking devices which are wireless. There are also some other security
measures as well like the addition of encryption to all the sensitive files as well as data, backup policy for
Document Page
3PROJECT-1
recovering data in case of any type of hardware failure and the maintenance of an adequate physical
network security [7]. Measures of security within the organization must also be taken by the
implementation of clear guidelines for all the employees in utilising Internet to get access to all the
websites belonging to non-work.
Summary of the Review
Managed security services are to be implemented within the organizations as it will be helping a
lot in the conduction of services either within the organization or remotely via the cloud. It will be
definitely offering a wide security service to the organization and hence organizations must be working
with the MSSPs for a number of reasons related to the security of organization.
Project Planning
S. No. Activity Duration Start Date Finish Date
1 Selection of research
topic
02 02/05/2019 04/05/2019
2 Identification of the
research gap
04 06/05/2019 10/05/2019
3 Gathering literature 06 11/05/2019 17/05/2019
4 Preparation of literature
review
07 18/05/2019 25/05/2019
5 Determining the sources
of information
05 26/05/2019 31/05/2019
6 Collection of data 10 01/06/2019 11/06/2019
7 Analysing the data and
findings
05 12/06/2019 17/06/2019
8 Summary of the results 02 18/06/2019 20/06/2019
9 Concluding the research 01 21/06/2019 22/06/2019
10 Future directions for the
study
01 23/06/2019 24/06/2019
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4PROJECT-1
Conclusion and future direction
It can be concluded that it has become very much important for all the organizations to work
with managed services of security for the betterment in the maintenance of security within the
organization. This will be helping a lot in preventing any kind of data breaches or risks of security or
some cyber-attacks from the organization. The plan of developing a managed security is to be
implemented within the organization for ensuring that the enterprise remains up to date with the status
of several audits, maintenance as well as security issues. This will be further helping the enterprise in
focusing upon the governance of security rather than upon all the administrative activities.
Document Page
5PROJECT-1
References
[1] J.W. Rittinghouse and J.F. Ransomen. Cloud computing: implementation, management, and security.
CRC press, 2017.
[2] J.Sen. Security and privacy issues in cloud computing. In Cloud Technology: Concepts, Methodologies,
Tools, and Applications (pp. 1585-1630). IGI Global, 2015.
[3] M.Roman, G.D. Buzzard, S. Shoaib, E. Krivopaltsev, and M. Diener. InnoPath Software Inc. Defining
and implementing policies on managed object-enabled mobile devices. U.S. Patent 8,375,136, 2013.
[4] S.P. Atkinson, Monitise Group Limited. Electronic system for securing electronic services. U.S. Patent
8,869,253, 2014.
[5] J. Davne, A. Volkov, M. Yankelevich and M. Malamud CloudNexa. Managing services in a cloud
computing environment. U.S. Patent 8,910,278, 2014.
[6] S. Pearson. Privacy, security and trust in cloud computing. In Privacy and security for cloud
computing (pp. 3-42). Springer, London, 2013
[7] P. Koenig-Richardson. Smart building unified managed solutions. U.S. Patent Application 13/454,142,
2013.
[8] A.Cezar, H.Cavusoglu and S. Raghunathan. Outsourcing information security: Contracting issues and
security implications. Management Science, 60(3), pp.638-657, 2013.
[9] O. Garcia-Morchon, S.Kumar, R.Struik, S.Keoh and R.Hummen. Security Considerations in the IP-
based Internet of Things, 2013.
[10] M.P. DeHaan, Red Hat Inc. Registering software management component types in a managed
network. U.S. Patent 8,914,787, 2014.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]