ISOL631 Cumberlands Operational Security in Local High School Paper

User Generated

EhcnEbwn

Writing

ISOL631

University of the Cumberlands

Description

You have been asked to design the “Security Operation Center”, First, you have to look at

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: COMPUTER SCIENCE

1

The Security Operation Center
Student’s Name
Institutional Affiliation
Date

COMPUTER SCIENCE

2

The Security Operation Center
Introduction
Following the increase in cybercrime rate in institution across the United States, it has
forced almost all the organizations to focus their attention on how to maintain their security
concerning information. Local High schools institutions for a long time have been suffering from
the dark web, which is mostly caused by hackers. On most occasions, the cyber security issues
are usually experienced due to constant phishing trials, accounts and systems that are easily
compromised; most high schools often experience illegal downloading. To handle all the
different types of abuses, it is upon the cyber security professionals linked to education
institution to find the balance between privacy, security and efficacy at the same time they have
to remember that this should be done while remaining sensitive to the political culture of the
learning institution. High school are, on most occasions, the target due to their vast volumes of
the public address space, a more significant bandwidth, availability of the valuable data which is
mixed with a weaker security posture. On top of that, the reason as to why most high schools
experience the cyber abuse is because of their system of governance believed to highly
decentralized, the high school environment on most occasions is free and caters for the studies.
The good thing about designing the operational security plan is that even the government have
come to realize that high schools, colleges and universities just like any other institutions go
through the same cyber threats. This paper aims to come up with strategies on how to pursue,
design, and implement an official security operation center for a high school institution. The
study paper aims to address the operational needs of cyber security, reduce the costs that are
related to cyber security and to defend the institutional assets through the use of a centralized IT
security and computer network defence capabilities.
A Security Operations Center is described as a team of professionals who know how to
handle issues that involve cyber security in preventing breaches of data and any other related
cyber security threats. The main aim of SOC is monitoring, detecting, investigating, and carry
out a response on threat involving cyber threats. It is upon the team members to make sure that
they apply a broader range of solutions and processes that involves technology, for instance, the
use of system information and event management systems (Nathans, 2014). On top of that, the
SOCs also can continue to perform scans that are believed to be vulnerable to a given network
for threats and any kind of weaknesses while handling the detected threats and deficiencies
before they become dangerous to the institution. To start, portray your present correspondence
model, and afterwards choose how to transmit it to a system of advantages and individuals who
handle those benefits. Notices sent from the Security Operation Center therefore should utilize a
solitary organization or layout to tell gatherings of unfavorable occasions and security
occurrences. The main reason as to why high schools should have and invest in a central IT
Security Operation Center is because it would help the school’s IT staff in responding to the
pervasive and increasing threats that involve cyber (Comfort, 2015). This is done through
identifying and tracking the school’s assets and data, discovering and controlling vulnerabilities
and threats involving cyber security, securing and defending the school’s critical assets, and
lastly is to provide the metrics dealing with cyber security to the school and its leadership. The
mentioned capabilities have great importance to the school in that they ensure that there are

COMPUTER SCIENCE

3

confidentiality, integrity and the availability of the school’s vital mission. At the same time, it
also assists in handling both the quantitative and qualitative factors, for example, the issue of
protecting the reputation of the school and personal privacy.
A vault of frameworks and proprietors can be a site used to fill in allotted jobs and
obligations; work as a register for processing resources, systems, and information; and permit
picking a single purpose of contact. This framework can keep running pair with existing contact
techniques until passed judgment on developing. The vault would incorporate data, for example,
an advantage name, IP address or IP address go, IT contact, and expected degree of information
affectability as per picked classifications. It would incorporate a framework proprietor and any
other contact individual (Nathans, 2014).
The Process
The most crucial factor to consider before coming up with a plan and dedication more
recourse to a given SOC, it would be essential to coordinate with the leadership of the school and
inform them on the time limit, the effort, and amount of money needed to fund the project. It all
depends on the estimated cost of the data breach that the school is likely to experience. The
amount that a school is willing to part with concerning the security operation center depends on
the data breach they are likely to face. For instance, schools that have never gone through any
cyber abuse and have never paid for mitigation are likely to be hesitant to use their resources in
preventing the unforeseen activity. Either way, it is essential to collect all the cyber security
metrics to analyze the balance between the cost that the school is likely to incur in case of cyber
security incidence in the school and the cost of owning and operating a SOC (Nathans, 2014).
There are important factors to put into consideration concerning the metrics. There is a
possibility to use an open-source tool at the same time; there is also an option of paying an
external vendor and coordinate a mass scan. Before designing the security operation center, it
would be essential to note that for it to operate correctly, it is crucial to identify the type of data
and the system to monitor and protect. The reason why it is crucial to ...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags