Project 2_Cybersecurity Incident Response CH.docx - Project...

This preview shows page 1 - 4 out of 17 pages.

Project 2: Cybersecurity Incident Response 1 Cybersecurity Incident Response CST 630
Project 2: Cybersecurity Incident Response 2 Executive Summary CenExCorp introduced BYOD to employees four months ago and it has been a welcomed addition. The technology has brought an increase in overall project production over the previous year. This in itself has justified the rollout of this technology. Currently, the company is supporting all laptop systems utilizing Mac O/S and Windows and mobile devices using Apple IOS and Android. This happens through a central device management system that pushes a policy based profile to the BYOD system. There have been a few drawbacks since the rollout. There have been two separate, yet very similar, intrusion attempts on the network through employee systems. In the first instance, a fellow employee reported the activity through our reporting webpage. The second instance highlighted our network monitoring software’s capabilities to detect suspicious activity. The first instance was determined to be an attempt where a malicious user captured the mobile devices MAC address from a local copy shop WiFi network. The attack then attempted to access the company BYOD network by using the authorized MAC address. The system denied the traffic, and the associated user was suspended until an investigation could be conducted. The second instance resulted from a policy oversight. An employee’s laptop was compromised at their home through own WiFi network. Again, the system denied the attempted breach. These instances have shown that the current setup is ensuring a secure network environment while allowing for productivity to thrive. The IT department will continually reviewing policy settings against the latest software and hardware on the market. This will enable the employees to keep their own mobile devices up-to-date with the latest security software while still being allowed to work remotely.
Project 2: Cybersecurity Incident Response 3 BYOD Introduction CenExCorp has embraced the Bring Your Own Device (BYOD) emergence within today’s information technology infrastructure. The benefits of BYOD are far reaching within any company. These benefits start with sound financial decisions and extend towards increased employee production and satisfaction. We provided the CenExCorp executive board several factors prior to the approval and implementation of this technology within the company. These factors included the knowledge that today’s employees have access to vast computing power. Today’s home computers, laptops, and mobile devices are far more financially attainable and proliferated than any time before. Employees in today’s businesses are far surpassing the technological capabilities of what they were able to a decade ago. A company would have had to supply an employee a mobile device or laptop to allow remote work. The computing devices provided to the employee were not leading edge, due to corporate financial

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture