The management and mitigation of insider threat

Assignment Help Basic Computer Science
Reference no: EM132398145

Write a 3 to 5 paragraph briefing paper that identifies and explains the three most important reasons why Sifers-Grayson should invest in an Identity Governance & Administration solution instead of continuing to use the existing paper-based process for requesting and issuing computer accounts.

Your audience is a mixed group of managers from across Sifers-Grayson's operating areas (company HQ's, Engineering, Finance & Accounting, Program Management, Sales & Marketing). Some of these managers are familiar with the importance of separation of duties and least privilege but most are not. One or two of the managers might know the definition for RBAC. Your briefing paper needs to address these information needs as well as discussing why information should be labeled as to its sensitivity ("classification") and ownership.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.

CASE STUDY

Description: This week, our focus shifts to IT services which are used in the management and mitigation of insider threat. Insiders, because of their access to information and information resources (e.g. workstations, servers, networks), potentially have the opportunity and the means by which to steal intellectual property, commit fraud, and perform other types of mischief and mayhem (ranging from pranks to deliberate sabotage).

For our focus firm, Sifers-Grayson, access control and identity management have not been a serious concern ... or so their executives and managers thought. The majority of employees and managers are from the local area where there is a strong sense of community. The founders of the company belong to families who were among the original settlers for the county. They contribute heavily to local charities and youth organizations. They rely upon these connections to family and community when hiring and have a strong tradition of promoting from within.

The problem is that Sifers-Grayson's operations and sales have taken them into the vast geographies of the Internet and cyberspace. There is an emerging awareness among the engineering staff of the potential for outsiders to attack the company through its Internet connections. The thought that an insider might cause trouble for the firm is still hard for them to accept.

The company can no longer afford to depend upon social morays and norms to protect it against the possibility of insider threats. The new contracts specifically require proper labeling of information ("data classification") and require control over access to government furnished information ("GFI"). This means that the company needs to change its culture and change its management processes.

The primary means for protecting against insider threats is to control insider access to information, information systems, and the information infrastructure. The two most basic processes used to protect against insider threat are identity management and access controls. Data classification is also an important protective process since it enables the use of the value or sensitivity of information when determining how and when to grant access. Privilege management is a third protective process which is used to protect against the misuse of permissive access to software applications and operating system functions. The principle of least privilege is an important control over this permissive access. Finally, separation of duties is a key business process which is used to prevent insiders from abusing access to information and information resources.

Reference no: EM132398145

Questions Cloud

How have the roles and functions changed over time : How has case management changed and evolved over time? How have the roles and functions changed over time?
List at least four general cultural factors and four : List at least four general cultural factors and four specific business factors driving global business.
Effective response to corporate accounting scandals : Do you believe in laws such as SOX were a reasonable or effective response to corporate accounting scandals of the time? Why or why not?
How data mining is used in your organization or business : Explain how data mining is used in your organization or business? Identify some of the pros and cons.
The management and mitigation of insider threat : Our focus shifts to IT services which are used in the management and mitigation of insider threat.
MGT211 The Project Plan and Resources Assignment : MGT211 The Project Plan and Resources Assignment Help and Solution, Southern Institute of Technology - Assessment Writing Service - Evaluate the essential
Discuss why randi thought this was not a heart attack : Discuss why Randi thought this was not a heart attack. What can Melanie do immediately to try to save Randi's life? Assuming that Randi is suffering.
Explain the concept of information stores : Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to success of an email search
Why do people tend to deny beliefs about race and ethnicity : Why do people tend to deny, rationalize, and avoid discussing their feelings and beliefs about race and ethnicity? The response must be typed, single spaced.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Proportion of new graduates

At the 0.05 level of significance, can you state that the proportion of new graduates who have found full-time work within four months of completion

  Calculate the future value of a investment paying interest

Work out the value of the investment after 1, 5, and 20 years. (Do not round intermediate calculations. Round your answers to 4 decimal places.)

  Documentation for system your team recently completed

Ray and Jason have just finished developing the documentation for a system your team recently completed.

  Explain how you would reduce potential vulnerabilities

Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

  Software developments is for developers to analyze

The goal of real world software developments is for developers to analyze, design, program, and test complete applications that solve the needs of the customer. The iLab exercises you have been given will give you practice with the specific programmi..

  How has configuration for connecting input-output changed

How has the configuration for connecting input/output (I/O) devices to computers on the motherboard changed since the late 1980s?

  Implement counter adt that functions as a hand-held clicker

Clicker counters also contain a button that can be pressed to reset the counter to zero. Design and implement the Counter ADT that functions as a hand-held clicker.

  Traditional definition of the digital divide

Briefly describe the traditional definition of the digital divide. What is it and who is affected, positively and adversely?

  Take moment to share your thoughts concerning lecture

Please take a moment to share your thoughts, ideas, comments and / or questions concerning lecture and topic.

  Identify and discuss potential disadvantages to organization

Use examples of real-world distributed systems and discuss how the associated organizations would benefit from the use of the systems in the short and long term. Identify and discuss potential disadvantages to the organization using the same distr..

  Regulation of international global labor standards

What is your opinion on the regulation of international global labor standards? Should all countries follow the same standards?

  How could chances of such an attack succeeding be minimimise

What should be done instead to alert the staff to the attempted intrusion, and how could the chances of such an attack succeeding be minimized?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd