Response to Question One.
The use of Global connectivity and cloud services in storing sensitive data has played a significant role in increasing cybersecurity risk. The comprehensive cloud services with poor configuration, mostly paired with sophisticated virtual criminals, have risen data breach and cyber-attack risks. Cybersecurity enhancement is, therefore, very crucial as it encompasses everything about sensitive data protection. As the chief of cybersecurity operation at the national palace, it is my mandate to establish and maintain programs responsible for adequate protection of technologies and information assets. For me to ensure the upcoming Gala is cyber secure, there is a need to consider some security guidelines.
To start with, I will identify all the probable risks in my current system. I’ll find out if there is any information manipulation at the server and client end. After coming up with the possible risks, I’ll find out from other organization which may have previously faced the same threats. I’ll try to learn from their mistake in setting my security guidelines. My team and I will be considerate of all legal requirements applicable and the required security level to ensure adequate security guidelines. It is important to note that an excessive level of security may hinder smooth business operations. Therefore, it is essential for my security strategy only to be pertinent to the situation at hand.
There will be ports maintenance, which will be done per the needs of systems to be secured. The number of devices connected to most switch ports will be reduced. The use of media access control addresses (MAC addresses) also needs to be limited to a given job procedure level. Techniques in port security will incorporate a more dynamic MAC address to devices connected to specific ports. In enhancing data security and keep it working, their addresses will be stored in the address table and configured with a switch port. Doing this will minimize instances of forwarding traffic by unspecified devices. To reduce port vulnerability, I will ensure the use of a more sticky MAC, which is saved in startup configurations.
Data encryption is another plan that I will put in place, and this will manage data integrity by keeping data consistency. The most standard encryption algorithm is the Advanced Encryption Standard (AES). It has the advantage of working efficiently and using less RAM. In AES, the key used in data encryption is the same key applied in decryption. From statistics, there are no cyber attacks discovered effective to AES up to date. In case of very confidential information that will harm many people if it leaks, an algorithm such as Triple DES will be used.
The last part in ensuring cybersecurity will be the implementation of security. The system will implement a honey pots firewall for this advanced security. The firewall will incorporate the installation of both software and hardware versions. The two versions have some drawbacks over each; they will, therefore, nullify each other disadvantages. Honey pots will be a mirage to the actual system, and attackers will not reach the real network but the honey ports. Attackers’ information collected from honey ports will later be useful in upgrading the security of the actual system. Applying all these techniques will ensure a significant success in enhancing cybersecurity on our premises.
Response to Question Two.
As a member of the leadership team in Global Zoo and also a cybersecurity officer (CSO), one is responsible for maintaining information and asset security. It is a requirement to protect systems and data using sophisticated instruments, tools, and information technology knowledge. CSO’s strategic operation must be in line with identifying the current threat, mitigating any vulnerabilities, and anticipating future cybersecurity threats. The utilization of new technologies available increases the security of the existing and emerging information technology systems.
The cybersecurity strategy operation plan that I would operate as a security officer has five main elements; mission statement, vision statement, introduction, governance, and strategic objective. The mission statement document will build the cybersecurity program in our organization for all situations facing dignitaries and staff. The vision statement will outline what we intend to accomplish: cybersecurity risk identification and minimization. The introduction gives a general overview of what will be done. It defines cybersecurity as an essential and critical part of an organization’s success. Its focus is on information protection from cyber threats. To enhance the capabilities of any organization to manage cybersecurity-related risks, one must first identify the threat and provide any foundation necessary to the project team. Governance refers to organizations component that can be useful in addressing cybersecurity, it includes daily activities that can be strategically managed. Strategic objectives explain the cybersecurity objectives and benefits obtained from their implementation. As a cybersecurity officer, my cyber strategy operation includes establishing a defense perimeter, critical information protection, raising security awareness, and ensuring building resilience, and pervasive agility.
In defense perimeter, the organization comes up with the information systems that are protective against malware or a maliciously unknown code. The system inhibits any unauthorized external or internal access. The organization also ensures that it only uses those products that are commercially secure, and their IT team has a security perimeter in all their desktop systems. The organization makes use of encryption, enhanced identification, and access control security methodologies to protect their critical assets and data.
The sessions for security awareness are created by the organization to train staff in regards to their cybersecurity rights; this makes them understand cyber threats they are prone to encounter and their precautions. Also, the organization shapes the system architecture to provide attack tolerance. It designs an operating system incorporated with the protection concept, and this enables the organization to recover from any successful attack. The organization maintains those operations that adapt to any future coordinated attacks. It employs a highly flexible and adaptive structure that can allow it to continually and dynamically reshape technology and operations aspects to face possible future threats.
The objectives of the strategy are to ensure the reduction of risk related to information loss or its unauthorized access or information systems modifications. Another aim was to maintain organizations’ cybersecurity architecture. The architecture provides a framework that integrates tools and applications to prevent threats. Maintenance of this architecture ensures an increased threat identification, which helps in planning for the prevention and staff training programs. Performance measures are carried out to evaluate cybersecurity implementations.