Free Essay

Security Monitoring

In:

Submitted By mobin1234
Words 1035
Pages 5
Security Monitoring
Mobin Bahrami
University of Phoenix
Information Systems Risk Management
CMGT/442
June 22, 2012
Brian Hoff

Intro Security monitoring is an important factor in keeping any organization network safe as various attacks are on a rise. A company constantly must practice monitory techniques to keep their data safe. " The first step is to scan the internal and external environment and identify information technology risks before they become a problem. The key is to be proactive rather than reactive" (Marilyn Greenstein). Different organization consist of many applications that require a certain level of security measures and risk assessment. To determine the associated risks within an organization each application needs to be thoroughly reviewed. Also risks may vary between internal and external applications. Many organizations remain profitable and grow by creating a good mixture of information technology and e-commerce. E-commerce focuses mainly on the product marketing and Internet sales, while information technology (IT) team handle all aspects of the organizations network. Malicious attacks, natural disasters, and internal breach are all good cause to maintain a security monitoring system.
Network Security Systems Security event monitoring involves monitoring activities that occur on a computer system such as, recording information and analyzing recorded data to identify any potential risks. Organizations must have a secure network to stay in business. The internal network in an organization include servers, data, applications, and equipments used within the company. The security of the internal network should consist of hardware and software. An organization must keep the employees and customers data within the network safe. Also the possibility of worms and viruses increase as the calls are responses to instant messaging, and e-mails in a company as well as the use of a wireless system allows possibilities for external attacks. The combination of content filtering, intrusion prevention, and firewall will help an organization to monitor their network.
Content Filtering Content filtering can prevent loading certain websites, and block spam e-mails at various filter levels including client-side and server-side. These types of filters are customizable software installed on a computer giving different access rights on a group level such as an employee and an executive.
Intrusion Prevention system Intrusion prevention system (IPS) monitor network activities for potential malicious activity. Once IPS identifies any malicious activity it blocks that activity and reports it to the system administrator. Also IPS can send an alarm after dropping the malicious packets, and resetting the connection from the offending IP address.
Firewall
A firewall is a different type of filer, which prohibits incoming and outgoing data while allowing the approved information. Also the connection that firewall prevents could be hackers attempting to gain access to the network. Internal IT It is the IT team task in maintaining the network and constantly monitoring internal and external activities in an organization. Activities can consist of websites accessed by employees, types of viruses and worms being removed, managing access to the network, individuals accessing the building, and external attempts logged by an intrusion device. Also documentation of all activities needs to be handled by the IT team. It is imperative that IT associates stay up-to-date in compliance with federal documentation and security laws because the activities within the network can be audited at any given time. Also the logged and monitored information can act as a way to strengthen the network security in a company. Activity logs allows the IT team to react with additional security and review what types of attacks could pose a threat.
E-commerce
E-commerce has significantly improved and grow revenue for many corporations. E-commerce applications allow companies to streamline online transactions between buyer and seller by decreasing operating costs and increasing customer satisfaction. E-commerce applications require critical networks to accommodate video, voice, and data traffic as the numbers of users increase the need for greater performance and support is necessary. As a network in a company enables more applications and are available to more users, the applications become more vulnerable to security threats. To ensure e-commerce transactions are not compromised security technology play a major role, and there are four categories that must be addressed: * Authentication ensures the safety of the systems and data by blocking access to unauthorized users while allowing users access. * Authorization allows only the user to change or modify within an account. * Encryption prevents third parties from recovering the original information, which cannot be recovered without access to the key. * Auditing keeps a record of operations such as, purchasing a merchandise.
Human Resources Human resources are vital resources in any company to succeed business needs and support the employees to meet their objectives. Employees should be trained and motivated by the management team to achieve their potential. The data accessed by HR and management team will have the identity protection such as, username and password to gain access to company system. The level of access by employees will be limited compare to HR and management, which allow associates information to remain secure on all levels.
Conclusion
This paper covered the best security practice and security monitoring within a company. Companies that develop a security monitoring measures will need to follow practice methods and have an organizational structure. " Continuous monitoring and review of risks is an important part of implementation, particularly for large projects or those in dynamic environments. It ensures new risks are detected and managed, and that action plans are implemented and progressed effectively" ( Dale F. Cooper). Network security should be logged, monitored, and adjusted on daily basis to be effective. For example attacks that are recovered must be reviewed as learning opportunities for the IT team. The use of IPS allows administrator to take the appropriate measures and prevent risks in early stage. Finally, the more up-to-date a company network security remains, it decrease the vulnerable risks, meaning there is never a complete security in an organization.

References
Dale F. Cooper. (2005). Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements, 1e: Monitoring and Review. Retrieved from Dale F. Cooper, CMGT/442 website.
Marilyn Greenstein. (2002). Electronic Commerce: Security, Risk Management, and Control, 2e: Risk Management. Retrieved from Marilyn Greenstein, CMGT/442 website.

Similar Documents

Premium Essay

Security Monitoring

...Security Monitoring In today’s business world an organization may consist of many different applications which require a certain level of risk assessment and security measures. Each application within the organization needs to be thoroughly reviewed in order to determine the associated risks and ways in which to protect against them. Another factor to be considered is that risk may vary between internal and external applications. There are many activities which can be incorporated into an organizations security plan which will help to mitigate possible risks and the loss that result from security breaches. It will be difficult for a company to achieve information security objectives without security event monitoring. Security event monitoring is derived from the general practice of monitoring activities that occur on a computer system. Security event monitoring involves recording information that represents activity and analyzing recorded information to identify and respond to questionable activities i.e.; possible security events Making Security Monitoring a Part of Your Best Security Practices. This first step would be to identify what exactly is considered questionable activity. While there is defiantly some level of activity which is considered acceptable the rules and boundaries must be clearly defined. An organization must take into consideration the applications to be used and the minimum level of security that can be used which will still...

Words: 927 - Pages: 4

Premium Essay

Security Monitoring

...Security Monitoring Russell McKay July 23, 2012 CMGT/442 William Glassen Security Monitoring Organizations in pursuit of success are challenged by taking risks. This challenge necessitates a call for risk assessment and defense through security processes. Evaluation of risks and assessment lends to defensive strategies producing a high level of security in relation to acceptable cost. Modern business endeavors of electronic commerce or e-commerce find a two front strategy between internal and external risk strategies. Security monitoring offers a measure of defense to both internal information technology and external risk from e-commerce applications. Event Monitoring Security as event monitoring inspects inbound and outbound network activity for suspicious patterns indicating an intrusion attempt. Common behaviors of users and processes create a baseline by documentation for determining normal activity. This baseline is able to provide a determination by monitoring between acceptable and unacceptable activities. Administrating to the detection system require sensitivity to techniques and methods of users for minimum levels of security that allow normal user functioning. Internal Information Technology Basic internal IT applications such as inventory, payroll, general ledger, and human resources are vulnerable to various risks. Risks include viruses, worms, identity theft, money and proprietary misappropriations. Internal controls as described by the Committee...

Words: 747 - Pages: 3

Free Essay

Security Monitoring

...Introduction [Writing suggestion: Avoid using "intro" or "introduction" if this is a subtitle. At the beginning of the essay, the following could be nothing else] One of the biggest concerns in today’s society relates to security in internal IT and e-commerce applications. Security is handled by passing and transactions between client browser and Internet server entering a secure site. The client browser is passed a public key by which transactions between client, and the web is encrypted. The process of monitoring security plays a vital function in any organization’s computer use both internally and externally. Security Organization Within a secure organization the business structure can cover a system of financial control, such as payroll, human resources, inventory, and general ledger vary the variety of agencies of the organization may be enhanced. Vulnerabilities in organizations will diminish, staff may be eliminated and so will duplications of work within departments, monetary information can stay secure, and most customer service may be better. Internal IT Internal IT is a beneficial service such as, compliance with federal and state laws, add valve to an organization’s internal control. Safeguarding the organization assets, and risk management just to name a few, mainly deals with computer applications monitors and manages employee’s activities, for instance it more of a help desk, side services, or a desk-side service infrastructure and application support...

Words: 663 - Pages: 3

Premium Essay

Security Monitoring Activities

...Security Monitoring Activities By: Ellie Schutt CMGT/442 INFORMATION SYSTEMS RISK MANAGEMENT David Conway University Of Phoenix December 12, 2011 Introduction This paper focuses on the security monitoring techniques that should be conducted within an organization in order to propose and recommend a solid action plan when a potential risk is identified. Many organizations and businesses must consider risk management a crucial part of their business in order to achieve the organizations set goals and to help ensure that the organization is conducting quality business to consumers. Security monitoring and measuring must be conducted with the organization’s IT department and e-commerce applications. Security Monitoring Process Conducting a security monitoring process is about preventing new attacks and responding to possible threats. Taking preventative steps can help organizations prevent small risks from turning into large and costly problems. The monitoring system should be used as part of the IT department’s regular duties and must be implemented both internally and externally. The first step of the process should be for the organization to determine what a potential risk is. Determining a list of risks must be among the considerations made by the organization, in order for the organization to operate in a true secure system. “Security monitoring helps to ensure both integrity and confidentiality for sensitive information. Security monitoring also serves as a way...

Words: 894 - Pages: 4

Premium Essay

Testing and Monitoring Security

...Testing and Monitoring Security Controls Two types of security events and baseline anomalies that are easy to identify are users that install software that is dangerous and when packets are sent to your router that are not permitted to be routed throughout your network. Using a security service or protocol that either comes with your operating system, or IOS in a routers case, is easy to manage so that administrators can be alerted when unauthorized activity takes place throughout your domain. A good administrator will set “triggers”, which are activities that are tagged for alarm, to allow him or herself to be alerted when a breach occurs. These services use protocols such as TCP, UDP, ICMP and SNMP(v1-3). Also, many firewalls can be set up to monitor incoming traffic by analyzing the ports on the TCP/UDP header and ensuring they are permitted to be passed within the domain. Within a windows domain, you can establish group policies to enforce restrictions on users that install unwanted software that can jeopardize security. These can either be enabled when base-lining an OS image for distribution, or through the domain controllers WAN policy group. Many networks can become prey to bad router configuration. WAN/LAN links usually suffer because administrators are reluctant to take a router offline to update access-lists. A possible solution to alleviating slip ups is to place an IP filtering firewall behind the router. This can be done in each area of the domain before...

Words: 414 - Pages: 2

Premium Essay

Testing and Monitoring Security Controls

...Testing and Monitoring Security Controls In the grand scheme of things security controls, in a nutshell, are in place to prevent security breaches. Security controls are safeguards or countermeasures to avoid, counteract or minimize security risks relating to personal property, or computer software. So anything that has to do with accessing sensitive information with the intent of using it maliciously is considered a security risk. Things that might be overlooked or investigated may be cause for concern as there are never any true false positives in the world of cyber security. A couple of things that usually go unnoticed are failed login attempts and increased network traffic. This is what can be done to prevent this issue. You are coming back from a much needed vacation and you attempt to log on to your computer. Using the same password that you have established for all of your accounts for this company yet you have a message stating that your password is incorrect. You then notice your caps lock is on, try the password again and all is right with the world. The IT department calls and asks did you have an issue logging in and they ask for details, you mention the caps lock key and they chalk it up as user error. The logon attempts log that was in place at your place of employment allows the security team to pickup when something is wrong. Now take that same situation but instead of caps lock being the reason, you cannot access it at all. You learn from the IT security team that...

Words: 755 - Pages: 4

Free Essay

Testing and Monitoring Security Controls

...look to check for suspicious activity in the event of a crime. They can help you understand where something went wrong. Creating a timeline, of before and after the performance problem or incident. The way traffic moves through a network, especially when the computers are only used for certain things, creates baseline behavior. When something is out of place, such anomalies seem suspicious; but legitimate traffic could be used in illegitimate ways and legitimate traffic can at times seem illegitimate. By consistently monitoring the network, and observing all the possibilities, the anomalies of legitimate traffic wont seem that abnormal and one can focus on the real problems. Predictable passwords that meet minimum length requirements but remain easily guessable is a hazard that could affect a network with a weak password. If that is a problem, one should probably change the password every so often. It would be in everyone’s best interest if the password security level was increased, and that they would expire after a certain amount of time. Removable storage devices that might contain malware, filtered only when passing through the network could be a problem. but by limiting the privileges of users, adapted to the duties assigned to the individual. Making it clear that no removable storage devices are to be brought into the network under no circumstance unless necessary and properly screened first. If an unencrypted laptop with sensitive information was to fall in the wrong...

Words: 313 - Pages: 2

Premium Essay

Testing and Monitoring Security Controls & Security Audits and Assessments

...Testing and Monitoring Security Controls & Security Audits and Assessments Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. * Authentication failures are one type of security event. A baseline anomalie that may indicate suspicious activity are unauthorized access attempts that can be found within log files. The log files contain records of all types of security events such as logon events, changes in system configuration and attempted violations of policy as well as system events like service startups and closures, errors and system warnings. * A second security event could be a sudden increase in overall traffic. It could simply mean that your website has been mentioned by a popular source, or it could mean that someone is trying to cause harm to your site. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities. * Problem: Removable storage drives introduce malware filtered only when crossing the network. Solution: Limit user privileges that only include those that are required by the duties that are assigned to that individual. This will hopefully make it clear that no removable storage devices are to be connected to the network, no matter the circumstances unless they are screened first. * Problem: Predictable...

Words: 316 - Pages: 2

Premium Essay

Testing and Monitoring Security Controls

...Behavior Anomaly Detection (NBAD) is a safety technique used in monitoring network for signs of bizarre activity. This program is enacted by establishing a baseline, overseeing at in situations of normal network and user behavioral characteristics. Using Network behavior anomaly detection you can obtain a baseline of system or network behavior? If an attacker is using a spoofed source address, legitimate traffic from that address will be blocked as well. A common way to gain control over a remote system is by installing a small application on a target machine. A Trojan horse is an application that is hidden in some other type of content, such as a legitimate program. It can be used to create a new, secret account called a back door, or it can be used to run spyware, which collects user keystrokes for analysis. Trojan horses can also be used to infect and control affected systems, destroy and expose valuable company information, or use your systems as launching pads for further attacks from the inside. Investigation is vital as it aids in triggering quick detection of viruses and worms that replicate on the server system, cause unscheduled reboots of the system and great data losses. If you have antivirus software installed on that server, the virus can turn off that antivirus software and firewall which was configured by antivirus. And that means your computer is not protected. Log Files contain complete records of all security events (logon events, resource access, attempted violations...

Words: 618 - Pages: 3

Free Essay

Raymond James Financial Bcd Travel, Houston Texans and Others

...company. Most of the issues described in the case are simple little issues such as emailing customer credit card numbers and such but I would have definitely have seen these issues but the lapse of these company have cost them security wise. The best way for organizations to strike the right balance between monitoring and invading their employees' privacy would be to evaluate each employees based on their activities. Have each employee make a report of their activities while the company is monitoring them as well the companies should put trust in their employees to report everything they're doing and when it is time to evaluate them cross compare what has been monitored and what the employees have reported. The consequence biased to one side would be if the company were to engage in just invading employee privacy there could be massive repercussions such as the company being sued etc. The other components are people security, establishing ethical behavior in the company, and managers taking the initiative to stop any leakage in the company. The human factor in is the stronger point in this situation its not the technology that's leaking information but the people the technology is just a tool to do so. The same goes for when it comes to monitoring and making sure that information is not leaked from the its the people who have to monitor to make sure that...

Words: 300 - Pages: 2

Premium Essay

Unit 5 Assignment 1 Testing and Monitoring Security Controls

...NT2580 Unit 5 Assignment 1 Testing and Monitoring Security Controls Jose J Delgado Testing and Monitoring Security Controls A few different types of security events and baseline anomalies that might indicate suspicious activity. Different traffic patterns or influx in bandwidth usage can be considered suspicious activity. Also, services changing port usage, in turn creating variations in normal patterns. All sudden increase in overall traffic. This may just mean that your web site has been mentioned on a popular news site, or it may mean that someone is up to no good. A sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner to track them. Some routers collect packet-level statistics; you can also use a software network scanner to track them. Also large numbers of packets caught by your router or firewall's egress filters. Egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because it is a clear sign that devices on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events. Log Files encompass complete records of all security events (logon events, resource access, attempted violations of policy, and changes...

Words: 524 - Pages: 3

Free Essay

Call Center

...service level, number of calls per employee, first call resolution, and transfer rate.  By using the statistical report, it will help show the relationship between their performance and the organization standards or goals and it is easier to visualize.  It can also be utilized by the managers to take necessary corrective actions if needed. The response time and service level can be measured by the monitoring how many calls are answered within how many seconds and total number of calls in a day is being answered.  It is important to monitor the total amount of calls but we must consider the number of calls an employee is answering and should be reported to ensure that individual employee is properly assessed. This will also show if the employees are answering them promptly and not just a handful is answering the calls.    The first call resolution (FCR) measures the individuals’ ability to accomplish the task in one transaction and not transfer the call.  Transfer rate indicates how many calls have been transferred to another party to be handled. Monitoring the number of calls being transferred can identify if there are any performance gaps and training if needed (Reynolds 2012).   Reynolds, Penny (January 2012) The Top 20 Contact Center Metrics for 2012. Multichannel Merchant, Retrieved from...

Words: 252 - Pages: 2

Free Essay

Riordan Manufacturing

...Currently Riordan Manufacturing has several different offices and each office is using a different type of system, but there is not a central system that monitors each of the satellite offices and their production. To assist Riordan become more efficient, they will need to implement a central system to monitor both individual and overlapping system usage. They should create a Data Center in the corporate office that monitors all of the current systems in place. This will allow Riordan Manufacturing to understand how their business is functioning and how application are used more often and which are not utilized enough, helping to determine if they should upgrade or discontinue the use of a system. Each department uses different applications; some of the applications interface with one another and other are stand alone. Riordan also currently has a lot of manual processes, for example how they submit daily inventory records. With the overall updates that our team has posed have more automation will assist Riordan to increase their production and accuracy. We can implement an application that can be used by all of the centers in order to maintain the inventory across the board so the managers are able to see what is in high demand in specific locations. Having an overall view of the inventory will be beneficial to the entire company. If the marketing department has he ability to see the inventory usage then they will know where they need to market certain products better. We...

Words: 420 - Pages: 2

Premium Essay

Product Bullet Points

...Product Bullet Points: Reliable remote monitoring Program up to 10 wireless devices Adjustable notification settings Large silence button Lightweight with belt clip and lanyard 60 day guarantee Product Features: SIMPLE REMOTE MONITORING Easily integrates with the Vive fall management system for caregiver peace of mind and to promote greater independence REAL-TIME ALERTS With a range of up to 150 feet, the pager provides instant alerts enabling prompt assistance to minimize falls and hazardous wandering CONNECT UP TO 10 DEVICES Program up to ten wireless devices to receive real-time alerts THREE NOTIFICATION SETTINGS Be alerted with an adjustable volume chime, a silent vibration mode or a combination of the two QUICKLY SILENCE ALARMS...

Words: 585 - Pages: 3

Premium Essay

How Ish Play Their Role

...How ISH can play their monitoring role (by using ISC’s code of activism) * ISH need to set out their policy on how to monitor the investee companies, for example :- (i) Meeting policy with investee company’s board and senior management (dialogue). (ii) How to minimize or dealt with the conflict of interest situation by the ISH. (iii) Strategy on intervene in investee company. (iv) Indicate the type of circumstances where and how further actions need to be taken by ISH. (v) Voting policy and voting disclosure. * Monitoring and communicating:- (i) Monitor the performance of investee company on regular basis. * Review the Annual reports and accounts / general meeting resolution. * Review whether the board of investee company is effective or not. (ii) Regular dialogue with investee company’s board / senior management. (clear information) * Attend investee company meeting and raise question where necessary. * Enter into active dialogue with Company’s board / senior management. ^ enable the ISH to identify the problem at earlier stage and reduce the SH’s value. ^ But ISH may not want to involve in the investee operation. * Intervene where necessary (i) ISH will only intervene when the investee company :- * Engages in risky strategy which will reduce SHs/ value. * Performance is less than satisfactory. * Acquisition / disposal that involve related party transaction (not in arm-length basis). (sell company’s...

Words: 428 - Pages: 2