Assistance Details

Oct 22nd, 2013
FratBro23
Category:
Computer Science
Price: $15 USD

Question description

Write the Overview and Structure of "Omega Security" (Proposed name of the company) using at least 800 words.  The details should cover: What is the mission of Omega Security is? How Omega Security is structured? What are the job roles and responsibilities of the different parts/units of Omega Security and the different employees of Omega Security? How the roles and responsibilities of each unit and/or employee fit together into the mission of Omega Security? Are there different levels of employees, such as managers and lower level workers who will have different information technology needs? I need to provide the big picture view of Omega Security in this draft. Later this information will be used in the final draft, we will need to discuss the information technology of Omega Security's proposed business in more detail. But here we are just trying to get a big picture of Omega Security itself and how everybody fits together to fulfill the mission of the Omega Security. The organizational overview section should describe the structure of the business that we are proposing, focusing on the different levels of employees in the organization (upper management, middle management, operational management, and lower level employees, such as production and service workers, and data workers) and their IT needs.

Omega Security is based on providing network and host security to small businesses.  The Omega Security will provide a tiered approach to support small businesses and infrastructure with detailed security on the status of network and devices.  The security of the business will also include providing the support of applications being used within the business.The name of the business is “The business that I propose to create is based on providing network and host security to small businesses.  The business will provide a tiered approach to support small businesses and infrastructure with detailed security on the status of network and devices.  The security of the business will also include providing the support of applications being used within the business.The name of the business is “Omega Security”

  Upper Management will constantly be considering the ways that the company will be implementing the new security needs of the customer in relation to the services that are being offered.  New security needs will be identified through the close communication taking place between the middle managers identifying new threats which have been found to be exploiting network and users.  Operational managers will be communicating the information associated with the customers that we are supporting.  The information would be related for example to systems not being patched at the proper levels, security measures not being properly implemented on the devices, and users inducing security incidents, etc.  Lower level employees would be the analysts responsible for monitoring the traffic associated with our customers.  Analysts would be broken out into sections such as network analysts, and host analysts.  My proposed employee roster would include: 3 Upper level managers, 4 middle mangers, 3 operations managers, 9 Lead Analysts, and 40 lower level analysts.

  The business will use the Splunk as the main tool for analyzing data present within its customer’s organizations.  (Security Onion) The Snort IDS will be used to monitor network traffic.  Helix with Sleuthkit/Autopsy will be used for host forensics.  Tools such as Suricata, Sguil, Squert, Snorby, Bro, NetworkMiner, Xplico will also be primary suite of tools used for Cyber defense.  The company will also provide support for monitoring of the security cameras and alerts within the premises of the business.  OmniSure will provide vulnerability assessments of the organizations through the use of penetration testing by leveraging MetaSploit and Kali. 

  Splunk will be the primary tool responsible for bringing together all the various device outputs.  The information provided by the support equipment previously mentioned within question 4 will be gathered and organized into automated reports that would give us insight into the status of each of our customer’s security postures.  Often organizations have been known to use a Security Information and Event Manager such as the one offered by ArcSight to accomplish this task, but today there are other more reasonable solutions available to accomplish an Enterprise level security solution such as Splunk.

  Our organization will have a Lead Analysts who would keep in close communication with the operations manager.  The Lead Analysts would be present within a dayshift, swingshift, and midshift schedule.  The Network and Host level Lead Analysts sections would work together in order to verify continuity of operations exists.  Operations would entail the monitoring of traffic and network devices, along with the host level analysis in relation to the activity.  Lead Analysts would ensure the analysts are performing the necessary tasks for securing customer information and infrastructure. A vulnerability assessment team will have a Lead Analyst within its section as well.  They will conduct the scanning of the devices within the organizations to ensure they not vulnerable to some of the known attacks found in the wild. The Lead analysts will work with the Operations managers who will look at the big picture of what is taking place within each of the sections and formulate the necessary measures that should be taken in order to efficiently defend our customers. The Operations manager will take their findings to the middle manager who will make recommendations to customers on updates or upgrades necessary for properly securing their information.  The Operational manager will also be responsible for continuation training associated.  They would be the experts who know the operations taking place on a day to day basis.  They would be the ones who after analyzing the information within their respective sections would then look to provide the Lead Analysts the perspective necessary for oversee the lower level analysts doing the analysis.  It would only make sense that both the Operations manager and Lead analysts be the experts.

I have already completed an Abstract and Introduction as well that I will provide you as well.









Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UC Berkeley
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
ddg82
Dec 4th, 2016
" Thanks, good work "
kenmwao2
Nov 22nd, 2016
" Solid work, thanks. "
tinytim47
Nov 21st, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
jestin7
Nov 12th, 2016
" This tutor is great! "
lilmoe415
Oct 29th, 2016
" Thank you, Thank you, for top quality work, this is your guy!! "
dontuwannaknow
Oct 7th, 2016
" Excellent work as always thanks so much "
thargrow
Sep 28th, 2016
" Very Satisfied. "
SjSurvivor143
Sep 23rd, 2016
" Thanks for the help. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1824 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors