Verified Document

Computer Science Defensive Response Strategy Term Paper

This represents the bulk of the cost effective security capabilities and facilitates better detection. Visibility to key areas and activities is vital. Effective monitoring to identify issues, breaches and attacks is necessary. This drives immediate interdiction by response capabilities. Efficient management of efforts to contain, repair and recover as needed to return the environment to normal operations is vital. This reduces losses by rapidly addressing issues and feeds intelligence into both the prediction and prevention areas (Defense in depth strategy optimizes security, 2008). Personnel Resources

Personnel requirements to implement a defense in depth strategy are many. This process will include experts drawn from several different areas. The teams that are vital include:

emerging threats team- this cross functional team continuously discusses emerging trends and events in order to identify imminent threats that might be out there.

threat horizon team -- this team works to classify different attackers or threat agents in order to understand who likely to attach, with what methods and what their motivations are.

rapid risk assessment team -- this team meets often in order to track the large number of emerging vulnerabilities and determine what risk that they bring.

security center of excellence team -- this team evaluates products for security and privacy in use both internally...

Securing organizational information and the systems that are used to manage and transmit data has become a high profile function. Failure to secure information can have a severe impact on business credibility. Threats to an organization come in a variety of forms, for example from hacking, viruses, and simple human error. The types of threats change constantly, so management must sponsor, design, and implement business and technical processes to safeguard critical business assets (Service Management Functions: Security Management (Part 1), 2005).
References

Defense in depth strategy optimizes security. (2008). Retrieved from http://www.intel.com/it/pdf/Defense_In_Depth_Strategy_Optimizes_Security.pdf

Hazlewood, V. (2006). Defense-in-Depth. Retrieved from http://www.sdsc.edu/~victor/DefenseInDepthWhitePaper.pdfPerrin, C. (2008). Service Management Functions: Security Management (Part 1). (2005). Retrieved from http://www.windowsecurity.com/whitepapers/Service-Management-Functions-Security-Management-Part1.html

Understanding layered security and defense in depth. Retrieved from http://www.techrepublic.com/blog/security/understanding-layered-security-and-defense-in-depth/703

Sources used in this document:
References

Defense in depth strategy optimizes security. (2008). Retrieved from http://www.intel.com/it/pdf/Defense_In_Depth_Strategy_Optimizes_Security.pdf

Hazlewood, V. (2006). Defense-in-Depth. Retrieved from http://www.sdsc.edu/~victor/DefenseInDepthWhitePaper.pdfPerrin, C. (2008). Service Management Functions: Security Management (Part 1). (2005). Retrieved from http://www.windowsecurity.com/whitepapers/Service-Management-Functions-Security-Management-Part1.html

Understanding layered security and defense in depth. Retrieved from http://www.techrepublic.com/blog/security/understanding-layered-security-and-defense-in-depth/703
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Physical Education and Computer Technology
Words: 11589 Length: 40 Document Type: Term Paper

Computers Are an Underutilized Resource for High School Physical Education Teachers Computers have become an integral part of the high school learning environment, beginning in the early 1990s. They provide a vast variety of resources to help enhance student education through presentation of material in a variety of media and act as an enhancement to teacher lessons. They can sometimes free teachers from routine tasks, allowing them to bring greater depth

Open Source Social Science
Words: 3536 Length: 13 Document Type: Term Paper

Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global

Defence and National Strategy
Words: 3037 Length: 10 Document Type: Research Paper

Introduction National strategy is the art and science of development and usage of informational, diplomatic and economic powers of a country in union with its armed forces for purposes of securing national objectives during war and peace times. National strategies are a key delivery mechanism for several new and existing nations. It was first introduced in the year 1998 with the aim of assisting in developing educational settings to improve the

Congress Toward Coordination of Intelligence
Words: 1895 Length: 5 Document Type: Essay

The international human relations together with global policy-making processes have led to intensification of wars in various part of the world. The justification of war is something that has taken root in the industrialized globe. Massive undertakings exist in the strategies and plans of many nations like the U.S.A., Afghanistan, Russia, and even in Germany. Moreover, justification of war has led to increase in simple crimes among individual nations. Global

Psychology Testing: Psychometric Emotional Intelligence
Words: 12427 Length: 45 Document Type: Term Paper

As emotionally intelligent employees are reportedly more content, conscientious and committed in the workplace, businesses and organizations are repeatedly advised to recruit and retain these individuals. Abraham (2006), nevertheless, reports that the strongest findings emerging from her study was.".. The effect of job control on emotional intelligence." She contends that emotionally intelligent employees will not just naturally thrive in their workplace; that the work environment needs to provide independence in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now