Security control mechanisms

As the CCISO, senior executives would like to know what security control mechanisms to put in place to mitigate risk and protect the confidentiality, integrity, and availability (CIA) of CB Drifter Technologies assets. They have provided some initial questions and need to discuss them. In this week’s discussion provide a 2-3 paragraph total response to the following questions based on NIST control classes:

What are administrative controls and why are they considered soft controls?
What is the control class that provides hardware and software functionality, and what are some examples of its functions?
How does the physical control class protect people, assets, and facilities against physical threats?

Security control mechanisms

As the CCISO, senior executives would like to know what security control mechanisms to put in place to mitigate risk and protect the confidentiality, integrity, and availability (CIA) of CB Drifter Technologies assets. They have provided some initial questions and need to discuss them. In this week’s discussion provide a 2-3 paragraph total response to the following questions based on NIST control classes:

What are administrative controls and why are they considered soft controls?
What is the control class that provides hardware and software functionality, and what are some examples of its functions?
How does the physical control class protect people, assets, and facilities against physical threats?

Border and Coastal Security

How did the material on Border and Coastal Security affect you?
Did your learning about the material on Border and Coastal Security change your mind about something? If so, how.
Has the material on Border and Coastal Security left you with any questions? If so, what are they.
Were there any unaddressed critical issues not covered by the material on Border and Coastal Security?
How will the material on Border and Coastal Security impact your future in Homeland Security?

Opinion on Border and Coastal Security

Write your opinion on Border and Coastal Security without using first or second person. In this paper, you get the opportunity to write your point of view on the material reviewed during the week – and the best part is that there is no wrong answer! This paper is your opinion, and as such, it is your job to express your thoughts in a manner that is comprehensible and clear for any and all readers. Feel free to write your thoughts freely, without any constraints.

After you finished the readings you selected for the week, it is time to brainstorm. Some simple brainstorm techniques for writing reflection papers can involve you answering some of the basic questions below:

How did the material on Border and Coastal Security affect you?
Did your learning about the material on Border and Coastal Security change your mind about something? If so, how.
Has the material on Border and Coastal Security left you with any questions? If so, what are they.
Were there any unaddressed critical issues not covered by the material on Border and Coastal Security?
How will the material on Border and Coastal Security impact your future in Homeland Security?

Components of the Reflection Paper

Introduction – specifies what you are reflecting upon.
Body Paragraphs – examines the ideas and experiences you have had in context to your topic. Be sure that each new body paragraph starts with a topic sentence. Remember that your paper must be at least 2½ pages long and no more than 3 pages so clear and concise writing is critical.
Conclusion – summarize what you have learned from the material. Tell the reader how this knowledge affected your overall understanding of the subject. Describe the feeling and overall lesson that you had from the material on Border and Coastal Security.

Opinion on Border and Coastal Security

Write your opinion on Border and Coastal Security without using first or second person. In this paper, you get the opportunity to write your point of view on the material reviewed during the week – and the best part is that there is no wrong answer! This paper is your opinion, and as such, it is your job to express your thoughts in a manner that is comprehensible and clear for any and all readers. Feel free to write your thoughts freely, without any constraints.

After you finished the readings you selected for the week, it is time to brainstorm. Some simple brainstorm techniques for writing reflection papers can involve you answering some of the basic questions below:

How did the material on Border and Coastal Security affect you?
Did your learning about the material on Border and Coastal Security change your mind about something? If so, how.
Has the material on Border and Coastal Security left you with any questions? If so, what are they.
Were there any unaddressed critical issues not covered by the material on Border and Coastal Security?
How will the material on Border and Coastal Security impact your future in Homeland Security?

Components of the Reflection Paper

Introduction – specifies what you are reflecting upon.
Body Paragraphs – examines the ideas and experiences you have had in context to your topic. Be sure that each new body paragraph starts with a topic sentence. Remember that your paper must be at least 2½ pages long and no more than 3 pages so clear and concise writing is critical.
Conclusion – summarize what you have learned from the material. Tell the reader how this knowledge affected your overall understanding of the subject. Describe the feeling and overall lesson that you had from the material on Border and Coastal Security.

Access Controls and Security Mechanisms

 

 

The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control while others should be available to everyone. What access-control methods need to be employed for the various systems? How can the company protect the new consultant network while at the same time providing the protection of data that the stakeholders and customers require?
In addition, you have been asked to describe 2 access control mechanisms and consider if they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and if they can be used in the company.
o For each of the applications and systems that were described in IP 2, describe the access control mechanisms that are needed for each.
o Describe how the new expanded network can be protected through access control.
o Describe SSO and VPN technology, and discuss whether they can be used in the company.
• Name the document “CS651_FirstnameLastname_IP3.doc.”

 

As the new Chief Information Security Officer for CB Drifter Technologies

 

As the new Chief Information Security Officer for CB Drifter Technologies, you have been asked by the CEO and CTO to start a discussion with the senior staff on the following:

1) What are the 5 new elements of the Information Security Governance framework. Describe each in 2-3 sentences.

Ideally the information security governance framework aligns with the organizational governance framework and considers internal and external factors shaping the security program leading to the next required discussion question:
2) What are the external and internal drivers that help shape a corporate security program? Describe each in 2-3 sentences.

IT & Physical Security Convergence

Identify and discuss three essential elements of convergence within the realm of public and private sector security. Formulate a hypothesis as to the effectiveness and extent of convergence efforts over the next decade. Please note you must present a hypothesis and discuss it – not merely state a hypothesis alone.

Convergence is the combination of physical and information Technology (IT) systems, processes and technological use. Convergence is present in almost all organizations, including our military, private and public businesses, and computing environments. The concept of convergence is the act of combining two or more environments or industries to form a new (business and IT). Often, the concept of convergence will overlap. For example, a security department will ensure all physical computing hardware are physically secured through the use of physical security measures. Conversely, an IT professional will ensure passwords are updated and secured. When we combined the goals of each industry, we are converging.

In today’s expanding security industry, there appears to be a movement for combining the security and IT industries. Each industry is specific and different in their own respect. However, after the September 11, 2001, terrorist attacks, both industries have generated a common goal. For example, ensuring business operations are maintained and secured. As a result, of this new movement, we are beginning to see security professionals seeking networking and computing security certifications.

When we think of convergence, please note, three common elements exist; the use of technology (physical and virtual), integration, and globalization. While physical security has been in existence since the caveman years where boulders were used to secure caves, the industry grew exponentially since the 2001, terrorist attacks. In the six years after the attacks, the industry advanced over 100 years. Further, the technology industry has grown exponentially, resulting an overlap of physical and technological security measures. As our cyber infrastructure advances at an unanticipated, security measures were not sufficiently addressed. As a result, we

Our adversaries continue to attack or information systems. Further, computer-related intrusions and cyber attacks are more prevalent as organizations become more and more dependent on information systems. In addition, the threat is further advance as hacktivists become sophisticated and persistent.

The goal of convergence encompasses people, assets and technology to work in a holistic manner. While the technological and security industry have co-existed independently of each other, the two industries have operated without harmony.

As businesses have become more and more dependent on technology, the concept of convergence has gain popularity in both industries (physical security and IT). The increase in support is primarily based on the need for corporate assets which are increasingly becoming information based. As a result, our three professional security organization have aligned their support to promote the concept of convergence.

The three leading security organizations are:

A) American Society for Industrial Security (ASIS) – Founded in 1955, the association is the world’s largest membership organization for security management professionals.

B) Information Systems Security Association (ISSA) – Founded in 1984, the association is a not-for profit international professional organization for information security practitioners and professional.

C) Armed Forces Communications & Electronics Association (AFCEA) – Founded in 1946, the organization is an international non-for-profit organization. The primary goal is to provide forums for military, government and industrial communities to collaborate on technological concerns.

College students have the opportunity to join the ASIS organization for a nominal fee. It is a great networking organization providing many opportunities for security professionals.

In conclusion, driving the security industry is the concept of convergence (physical and technical). Blending physical and IT security is a harmonious manner is very important to the overall goal of convergence. The term Convergence is broad and encompasses divergent or even competing entities and/or disciplines. For example, the security department of an organization and the Information Network departments. While each department is somewhat mature and widespread, collaboration between the cyber and physical security disciplines is lacking in organizations. Further, cyber-physical convergence, though widespread, can be an ambiguous process. Do note the concept of convergence is not a seamless or perfect process, nor is it one that follows a set template. The over-reaching goal of convergence is to work holistically to meet the organization’s mission.