CST630Project_2_Incident_Response-HR.docx - Running head...

This preview shows page 1 - 5 out of 19 pages.

Running head: PROJECT 2 INCIDENT RESPONSE 1 Project 2: Incident Response xxxxxxx CST 630 Advanced Cyber Exploitation and Mitigation Methodologies Prof. xxxxx University of Maryland University College Date
PROJECT 2 INCIDENT RESPONSE 2 Table of Contents I. Executive Summary ................................................................................................................... 3 II. Wireless and BYOD Security Plan .......................................................................................... 4 III. Tracking Suspicious Behavior ................................................................................................ 9 IV. Continuous Improvement Plan ............................................................................................. 12 V. Remote Configuration Management ..................................................................................... 13 VI. Employee Misconduct ........................................................................................................... 14 VII. Wireless Traffic Analysis ..................................................................................................... 16 VIII. Recommendations and Conclusion ................................................................................... 17 IX. References .............................................................................................................................. 18
PROJECT 2 INCIDENT RESPONSE 3 I. Executive Summary In order to stay relevant as we start to wrap up the second quarter of 2019, this organization has endured a major infrastructure transformation. Mobile computing is what defines the modern age of businesses today, the capabilities/technology available at the click of a button on a mobile device today was unheard of 15 years ago. Therefore, it was decided nine weeks ago to establish a Bring Your Own Device (BYOD) policy for this company. As of now this policy only supports mobile devices that utilize either the Android Operating System (OS) or Apple IOS, as well as laptops or tablets using Windows or Mac OS. Based off the analysis from a recent productivity report, it shows that since the BYOD policy was released employee efficiency and morale has considerably increased. Simultaneously, the BYOD policy has inadvertently exposed this company’s infrastructure to vulnerabilities that were previously not considered. During the last month there have been multiple security incidents, which had they gone undetected could have potentially compromised this organizations network. Fortunately, everything was identified and addressed prior to any major breach occurring. The recent security incidents serve as a potential warning, showing the need to have a clear understanding of risks associated with the BYOD policy. In order to provide clear guidance, an updated BYOD security plan needs to be established. It needs to provide better rogue access point scanning as well as implementing a remote configuration management system, providing better security for all devices within its network. This company’s leadership needs to take these security risks serious and support the development of this security plan. As technology continues to advance year to year, the capabilities of nefarious actors continue to
PROJECT 2 INCIDENT RESPONSE 4 advance as well. It is not a question of “if” there will be another attempted security breach, but “when” will it happen and are we going to be prepared. II. Wireless and BYOD Security Plan In late 2018 our organization introduced a new Bring Your Own Device (BYOD) policy that authorized our employees to use their own devices (smart phones, tablets, and laptops) to execute work related tasks on the company network. For security purposes, this policy did not support the use of any hardwired device and employees were not authorized to connect their laptops to the ethernet drops at their workstation. The BYOD policy was intended to support Wi-

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture