Reference no: EM133499047
BUSINESS CASE: Star Biotech Company: Star Biotech uses living organisms to develop new drugs. Star Biotech focus on developing treatments for diseases that are difficult to treat with traditional drugs. Star Biotech has an IT system with office desktop computers and a data center. There are two departments.
- Research and development department
- Management office department
The Star Biotech research and development department with 50 employees assigned to involve mission-critical data processing. Each and every computer is part of an important business process, therefore, data communication traffic that is directed at each computer should be monitored.
The management office is the second department of Star Biotech. Where 100 employees are conducting regular business activities in the management office department. The data communication traffic among all these computers should be monitored network traffic for suspicious activity.
You should act like an IT manager and answer the questions
Question: Once the OS for each computer is appropriately built, secured, and deployed, the process of maintaining security is continuous. This results from the constantly changing environment, the discovery of new vulnerabilities, and hence exposure to new threats.
As an IT manager, how you would provide security maintenance in the long run? Describe the steps