Uber Enterprise: Technical Infrastructure IT Security Plan Report

Verified

Added on  2023/06/11

|5
|764
|99
Report
AI Summary
This report provides a comprehensive IT security plan for Uber Enterprise, focusing on key technological areas and security considerations. It details a five-step approach to security planning, including identifying and classifying resources, protecting access, detecting threats and attacks, responding to vulnerabilities, and enhancing analytics. The plan emphasizes the importance of updated hardware and software, risk assessment through antivirus and firewalls, and regular security audits to prevent unauthorized access and data breaches. The document also touches upon the application of security standards to safeguard the organization from potential threats, offering a structured approach to maintaining a secure IT environment for Uber. Desklib provides access to this and other solved assignments.
Document Page
Running head: IT SECURITY
Information Technology Security
Name of Student-
Name of University-
Author’s Note-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1IT SECURITY
Enterprise Technical Infrastructure Security Plan
For dealing with the IT Security Plan for Uber Enterprise, the security plan has many
technological areas that are to be considered. To consider the technological areas of Uber
enterprise, there are many security professionals who helps in crafting a plan for the organization
(Nelson & Staggers, 2016). The first thing that is considered is to understand the security
technology of next generation and why the security plan is needed for Uber. There are mainly
five steps that are to be considered while making a security plan for the organization. The steps
are stated below.
Step 1: Identifying the resources and classifying them accordingly
The first step while making the security plan is to identify all the resources available with
Uber as well as classifying them accordingly. All the physical resources in Uber Company such
as computer, laptops, cars, etc. are to be identified and classify them accordingly (Dhillon, Syed
& Pedron, 2016). There are hardware resources as well as software resources in a company and
the resources keeps on changing and updating them from time to time is needed.
Step 2: Protecting the access of resources
Security plan involves protecting the resources in the organization. After identifying the
resources, all the resources are to be protected by using security equipment like firewalls, and
web gateways.
Step 3: Detecting threats and detecting attacks
The security plan that is made should have the ability to detect the threats or attacks
involved in the organization. Detecting threat, vulnerability, or detecting an attack are different
Document Page
2IT SECURITY
things. A good security plan should be able to detect the vulnerabilities, attacks and threats
involved in Uber.
Step 4: Respond to threats, vulnerabilities and the attacks
After detecting the threats, the security plan should have possible mitigation techniques
that can mitigate such vulnerabilities.
Step 5: Enhance analytics
Analytics is important in the organization to identify what has happened and what is
going to happen. Analytics helps to figure out the possibilities in future.
Enterprise Risk Assessment, Audit and Cyber law
The risk assessment plan that is to be considered for the Uber is to firstly confirm that all
the hardware as well as the software that are installed in the company should be updated. The
updated hardware and the software helps the organization to ensure that any kind of dishonest
users do not access account of the employers and other users (Akinrolabu, New & Martin, 2017).
The updating of software and the hardware helps to mitigate eavesdropping and also stops to
distort data. The risk assessment involves antivirus or firewalls that helps to mitigate any
vulnerabilities in the company system.
There should be proper way of auditing the resources as well as the working process in
the company. There should be security audits in the organization that can help Uber Company to
understand any type of threat that can come to the company (Biener, Eling & Wirfs, 2015). Any
type of unauthorized access are noted as well as solved by auditing reviews.
Document Page
3IT SECURITY
To keep the Uber Company secure from any type of data fraudsters, there are security
standards applied to the organization. The security standards that are applied to the organization
keeps the company from any type of threats that may come to the organization.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4IT SECURITY
References
Akinrolabu, O., New, S., & Martin, A. (2017). Cyber supply chain risks in cloud computing–
bridging the risk assessment gap.
Biener, C., Eling, M., & Wirfs, J. H. (2015). Insurability of cyber risk: An empirical
analysis. The Geneva Papers on Risk and Insurance-Issues and Practice, 40(1), 131-158.
Dhillon, G., Syed, R., & Pedron, C. (2016). Interpreting information security culture: An
organizational transformation case study. Computers & security, 56, 63-69.
Nelson, R., & Staggers, N. (2016). Health Informatics-E-Book: An Inter-professional Approach.
Elsevier Health Sciences.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]