Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Addressing security breaches in a retail company IT department: You have been re

ID: 3662967 • Letter: A

Question

Addressing security breaches in a retail company IT department:

You have been recently appointed as the Chief Security Officer for a large retail company. Your boss believes that, in a cloudy, mobile and high speed information consumption driven world, traditional network boundaries are blurred and the perimeter based security approaches are no longer effective. The threat is enhanced by the sophisticated analytics capabilities the hackers are starting use to snoop. She has asked you to come up with a new approach that uses an intelligence-driven security model, which relies on security information in real-time from both internal and external sources to construct a realistic risk and vulnerability.

1.A paper which must contain following:   

#Executive summary

#Problem statement

#Key requirements to address the problem

#Key research findings

#Solution options/conclusion/recommendations

Explanation / Answer

Executive summary:
"chief security officer" (CSO) means is highest-level executive directly responsible for the organization's the entire security function.
Not only responsible for their an organization's . and also responsible for physical security and electronic or digital security and computer networks.
The job of chief security officer (CSO) is work with other executive and decide on the priority of security needs.
The chief security officer (CSO) also oversee the network of the security directors and managers,staff.
chief security officer (CSO) role is within organization to help strong and secure connection between departments.
chief security officer (CSO) information security type he/she responsible for protecting company and information of employees from unauthorized access or unauthorized persons.

Problem Statement:
In this world technology developed rapidly so the chief security officer (CSO) provide security physical,digital or electronic and management planning.
he/she analytics capabilities of the hackers information

Key requirements to address the problem:
1.The practice of the cyber security should focus on the instructions and the compromise do not result the business loss.
2.Every Organizations Needs to shift more security resources for threat detection,remediation.
3.To improve threat detection it requires intelligence-drivensecurity approach.This approach helps the to provide security both internal and external.
find hidden threats also.
4.Technology automation it helps the analysts make most of the time by slashing the workload so different types of risk affected the organization.
5.Every organization each and every employee need to educate security policy and risks.
6.Maintain the data flexible architecture.
7.Observere every employees which type of information they sent and they took any important information about company by sending mails or copy by using pendrives or CDS
or mobile devices.
8.when we more data to provide more security.
9.Dont share login user name and passwords to other employees.
10.Identity and access management (IAM).

Key research findings:

1.SOC (Security Operations centers)
     Scalable analytics engines
     Consolidated warehouse for security data
     Centralized management dashboard
     Flexible data architecture
     Automated data normalization
     Pattern-based monitoring techniques
     Rich correlation of incident information
     Full network packet capture
     External threat intelligence services
     Active countermeasures and controls
     Integrated compliance management process
2. Big Data Fuels Intelligence-Driven Security.
      Diverse data sources
      Automated tools
      Analytics engines
      Advanced monitoring systems
      Active controls
      Centralized warehouse
      Standardized views
      N-tier infrastructures
      High degree of integration

Solution options/conclusion/recommendations:

For the best results follow the security operations and many leading organizations can achieve the result such as reduce the average time for resolving threats by up to 60 percent.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote