Develop a wireless and byod security plan

Assignment Help Computer Network Security
Reference no: EM131963627

The assignments for this project are as follows: Executive briefing: This is a three- to five-slide visual presentation for business executives and board members. Executive summary: This is a one-page summary at the beginning of your CIR. Cybersecurity Incident Report

Report

You've recently been promoted to the role of a cybersecurity incident manager as part of a new contract with a major media and entertainment company. The company requires its employees, artists, and clients to have wireless and mobile device access to company networks. Because of the bring your own device policy, there has been an increase in the number of cybersecurity incident reports. You realize that you need to increase awareness of security standards. In your security monitoring of the company networks, you use tools that track employee behavior.

You want company leadership to understand the technologies used in wireless networks and mobile device management, and you want those leaders to be educated about the implementation, threats, and safeguards for all devices-- including personal units that are used for work related tasks. You believe that executive leadership needs to incorporate these kinds of safeguards as part of its business strategy. You decide to compile a cybersecurity incident report that you will send to management. You will list the actions, defense, and preventative measures you have taken to address threats and why.

The report will incorporate terminology definitions, information about the cyber kill chain, and impact assessments. Your cyber incident report will need to illustrate the threats you discovered and the resolutions you employed. You want leadership to be confident about the strategy you have used to defend the company's networks.

Today's companies face many different security challenges to their networks, and a company's incident manager needs to be ready to respond to potential threats. Some of those threats can occur from the actions of well-intentioned employees who fail to follow security protocols, and others can arise from disgruntled workers who may be able to access accounts on personal devices long after leaving an organization.

Wireless devices and bring your own device (BYOD) computing in the workplace often increase productivity and convenience, but such ubiquitous access to resources can be a significant threat to organizational security, and BYOD computing adds another layer of concern for the incident manager.

Remote management, such as tracking and data swipes, helps to locate devices containing company data and to eliminate any unauthorized viewing of that data. Authentication, access controls, and strong encryption are just some of the security measures that need to be part of a secure wireless network and mobile device management practices in the workplace. However, security will need to evolve in order to protect against employees who may have malicious intent. It will need to include behavior cues as well as effective countermeasures, as the need for greater employee availability drives more wireless computing and BYOD integration in the workplace.

For this project, you will take a close look at the variety of threats facing an incident manager as you develop a cybersecurity incident report (CIR) for management with an executive summary, along with an executive briefing for a company. For details on the length of the assignments, see the final step of the project.

There are seven steps to complete the project. Each step will highlight the types of threats you will encounter. Most steps in this project should take no more than two hours to complete, and the project as a whole should take no more than two weeks to complete. Begin with the workplace scenario, and then continue to Step 1.

Deliverables
cybersecurity incident report (CIR), slides to support executive briefing When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
- 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
- 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
- 1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.
- 1.4: Tailor communications to the audience.
- 1.5: Use sentence structure appropriate to the task, message and audience.
- 1.6: Follow conventions of Standard Written English.
- 1.7: Create neat and professional looking documents appropriate for the project.
- 1.8: Create clear oral messages.
- 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
- 2.4: Consider and analyze information in context to the issue or problem.
- 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
- 5.4: Identify potential threats to operating systems and the security features necessary to guard against them.
- 7.3: Knowledge of methods and tools used for risk management and mitigation of risk.
- 8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.
- 8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.
- 8.3: Responds to incidents through threat mitigation, preparedness, and response and recovery approaches to preserve life, property, and information security. Investigates, analyzes, and continuously improves relevant response activities and practices.
- 8.4: Possess knowledge of proper and effective communication in case of an incident or crisis.
- 8.5: Obtain knowledge and skills to conduct a post-mortem analysis of an incident and provide sound recommendations for business continuity.

- Step 1: Develop a Wireless and BYOD Security Plan
- Since the company you work for has instituted a bring your own device (BYOD)policy, security attitudes have been lax and all sorts of devices, authorized and unauthorized, have been found connected to the company's wireless infrastructure. In this first step, you will develop a wireless and BYOD security plan for the company.
- Use the NIST Guidelines for Securing Wireless Local Area Networks (WLANs) Special Publication 800-153 to provide an executive summary to answer other security concerns related to BYOD and wireless. Within your cybersecurity incident report, provide answers to the threat of unauthorized equipment or rogue access points on the company wireless network and the methods to find other rogue access points. Describe how to detect rogue access points and how they can actually connect to the network. Describe how to identify authorized access points within your network.
- Within your plan, include how the Cyber Kill Chain framework and approach could be used to improve the incident response times for networks.
- Include this at the beginning of your CIR as the basis for all wireless- and BYOD-related problems within the network. Title the section "Wireless and BYOD Security Plan."
- Click the following link to learn more about security management: Security Management.
- In the next step, you will explore a scenario on suspicious behavior, and your report will provide another section of your CIR.

- Step 2: Track Suspicious Behavior
- You've completed your wireless and BYOD security plan. Now it's time to take a look at another workplace situation.
- You have been notified of an employee exhibiting suspicious behavior. You decide to track the employee's movements by using various tools and techniques. You know the location and time stamps associated with the employee's mobile device.
- How would you track the location of the company asset?
- Explain how identity theft could occur and how MAC spoofing could take place in the workplace. How would you protect against both identity theft and MAC spoofing? Address if it is feasible to determine if MAC spoofing and identity theft has taken place in the workplace. Include a whitelist of approved devices for this network. Examples may include authorized access points, firewalls, and other similar devices.
- Are there any legal issues, problems, or concerns with your actions? What should be conducted before starting this investigation? Were your actions authorized, was the notification valid, or are there any other concerns? Include your responses as part of the CIR with the title "Tracking Suspicious Behavior."
- In the next step, you will explore another workplace scenario, and your responses will help you formulate a continuous improvement plan, which will become another part of your CIR.

- Step 3: Develop a Continuous Improvement Plan
- Now that you've completed the section on tracking suspicious behavior for your CIR, you are confronted with another situation in the workplace.
- You receive a memo for continuous improvement in the wireless network of your company, and you are asked to provide a report on the wireless network used in your company. You have been monitoring the activities on the WPA2. Provide for your leadership a description of wired equivalent privacy and also Wi-Fi protected access networks, for education purposes. Include the pros and cons of each type of wireless network, as well as WPA2.
- Since WPA2 uses encryption to provide secure communications, define the scheme for using preshared keys for encryption. Is this FIPS 140-2 compliant, and if not, what is necessary to attain this? Include this for leadership. Include a list of other wireless protocols, such as Bluetooth, and provide a comparative analysis of four protocols including the pros, cons, and suitability for your company.
- Include your responses as part of the CIR with the title "Continuous Improvement Plan."
- In the next step, you will look at yet another workplace scenario, and you will use that incident to show management how remote configuration management works.

- Step 4: Develop Remote Configuration Management
- You've completed the continuous improvement plan portion of the CIR. Now, it's time to show how your company has implemented remote configuration management.
- Start your incident report with a description of remote configuration management and how it is used in maintaining the security posture of your company's network. Then, consider the following scenario:
- An undocumented device is found on the company network. You have determined that the owner of the device should be removed from the network. Implement this and explain how you would remove the employee's device. How would you show proof that the device was removed?
- Include your responses as part of the CIR with the title "Remote Configuration Management."
- In the next step, you will illustrate how you investigate possible employee misconduct.

Step 5: Investigate Employee Misconduct
In this portion of your CIR report, you will show how you would investigate possible employee misconduct. You have been given a report that an employee has recorded logins during unofficial duty hours. The employee has set up access through an ad-hoc wireless network. Provide a definition of ad hoc wireless networks and identify the threats and vulnerabilities to a company. How could this network contribute to the company infrastructure and how would you protect against those threats? Use notional information or actual case data and discuss.
Address self-configuring dynamic networks on open access architecture and the threats and vulnerabilities associated with them, as well as the possible protections that should be implemented. From your position as an incident manager, how would you detect an employee connecting to a self-configuring network or an ad hoc network? Provide this information in the report. How would signal hiding be a countermeasure for wireless networks? What are the countermeasures for signal hiding? How is the service set identifier (SSID) used by cybersecurity professionals on wireless networks? Are these always broadcast, and if not, why not? How would you validate that the user is working outside of business hours?
Include your responses as part of the CIR with the title "Employee Misconduct."
In the next step, you will use lab tools to analyze wireless traffic.

Step 6: Analyze Wireless Traffic
You've completed several steps that you will use to present your CIR. In this step, as part of a virtual lab, you will analyze wireless traffic.
You are given access to precaptured files of wireless traffic on the company network. This is another way to monitor employee behavior and detect any malicious behavior, intentional or even unintentional.
Note: You will use the tools in Workspace for this step. If you need help outside the classroom, you can register for the CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Lab assistants are available to help.
Click here to access the instructions for Navigating the Workspace and the Lab Setup.
Click here to access the Project 2 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use. Then, enter Workspace.
Include your responses from the lab as part of the CIR with the title "Wireless Traffic Analysis."

Step 7: Prepare the Cybersecurity Incident Report, Executive Briefing, and Executive Summary
You've completed all of the individual steps for your cybersecurity incident report. It's time to combine the reports you completed in the previous steps into a single CIR.

The assignments for this project are as follows:

1. Executive briefing: This is a three- to five-slide visual presentation for business executives and board members.

2. Executive summary: This is a one-page summary at the beginning of your CIR.

3. Cybersecurity Incident Report (CIR): Your report should be a minimum 12-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.

Submit all three documents to the assignment folder.

Deliverables: Cybersecurity Incident Report (CIR), Slides to Support Executive Briefing

Learning Competencies: 5.1, 5.3, 5.5., 5.6, 5.7, 5.9

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.
- 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
- 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
- 1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.
- 1.4: Tailor communications to the audience.
- 1.5: Use sentence structure appropriate to the task, message and audience.
- 1.6: Follow conventions of Standard Written English.
- 1.7: Create neat and professional looking documents appropriate for the project.
- 1.8: Create clear oral messages.
- 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
- 2.4: Consider and analyze information in context to the issue or problem.
- 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
- 5.4: Identify potential threats to operating systems and the security features necessary to guard against them.
- 7.3: Knowledge of methods and tools used for risk management and mitigation of risk.
- 8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.
- 8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.
- 8.3: Responds to incidents through threat mitigation, preparedness, and response and recovery approaches to preserve life, property, and information security. Investigates, analyzes, and continuously improves relevant response activities and practices.
- 8.4: Possess knowledge of proper and effective communication in case of an incident or crisis.
- 8.5: Obtain knowledge and skills to conduct a post-mortem analysis of an incident and provide sound recommendations for business continuity.

Attachment:- Report instructions.zip

Reference no: EM131963627

Questions Cloud

Make good economic sense : A first conviction may result in a fine of up to $500, even though the social cost of the litter is likely much lower than this amount.
What is the maximum price you should pay for the bond : If your cost of capital is 12%, what is the maximum price you should pay for the bond?
What are the benefits for a hospital to organize : What are the benefits for a hospital to organize itself as a nonprofit, and do nonprofits make less money than for-profit hospitals?
What is the standard deviation for the returns : An investor has researched financial information for Dixie Chicken Corporation over the past three years. What is the standard deviation for the returns?
Develop a wireless and byod security plan : CST 630 Develop a Wireless and BYOD Security Plan - Explain how identity theft could occur and how MAC spoofing could take place in the workplace
British subsidiary determine which currency to borrow : What characteristics do you think would help the British subsidiary determine which currency to borrow?
Minimize the variance of his portfolio : How many of X should be purchased to minimize the variance of his portfolio?
What are the requirements for effective segmentation : What are the segmentation variables or bases (e.g., demographic, psychographic, etc.)? What are the requirements for effective segmentation?
Which aspect of object modeling did you find the easiest : Which aspect of object modeling did you find the easiest to understand? Why? In what ways do you expect to apply that technique?

Reviews

len1963627

4/30/2018 5:50:55 AM

The assignments for this project are as follows: Executive briefing: This is a three- to five-slide visual presentation for business executives and board members. Executive summary: This is a one-page summary at the beginning of your CIR. Cybersecurity Incident Report (CIR): Your report should be a minimum 12-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd