100%(6)6 out of 6 people found this document helpful
This preview shows page 1 - 4 out of 19 pages.
Running Header: Project Two 1Project Two: Incident ResponsexxxxCST 630 -7631University of Maryland Global Campus
Running Header: Project Two 2Executive summaryCybersecurity incidents are on the rise and it is the responsibility of all employees to understand and utilize best practices when using any device to conduct business activities. Acme Contracting Company’s (ACC) security team needs to identify and understand insider and outsider threats which can pose potential threats. The Bring Your Own Devices (BYOD) plan utilized by employees and clients includes the use of laptops, mobile phones, and tablets which have the capability to function on different operating systems and become vulnerable to a plethora of different security threats. Although the use of BYOD has the ability to increase productivity and convenience, its implementation has introduced more security challenges than ever before. To address these issues, this document will clarify actionable implementations to reduce vulnerabilities, identify threats, and prevent security incidents that negatively impact the network security on a daily basis. To better the security foundation of the company, a BYOD security plan will be developed. This plan will discuss the security of wireless access points, threats to the enterprise, and techniques used to improve incident response. Additionally, this document will discuss how suspicious behavior will be tracked, remote management maintenance, employee misconduct, and ways to continually improve security. This includes but is not limited to the documentation of employee behavior, defensive measures, and the legal aspects of monitoring and using BYOD’s. As the cybersecurity incident manager, I recommended that the company requires its employees and clients to become better acquainted with the current BYOD policy and other security best practices that can keep company data secure from threats. Wireless and BYOD Security Plan
Running Header: Project Two 3ACC has adopted the BYOD policy to meet the needs of employees by granting them permission to purchase and use personally own mobile devices for work purposes. The wireless and BYOD security plan is intended to protect company data and its network infrastructure. As outlined in the plan, ACC will define security risk to network security, rogue access points and incident response. ACC reserves the right to revoke employees’ privileges and access if policy guidelines are not adhered by. As the use of personal devices continue to grow, so do security concerns. The enterprise requires a strong network security plan to ensure all connected systems and devices are protected. Due to the overwhelming number of different operating systems and version of third party applications, vulnerabilities continuing to leak into ACC’s network infrastructure. Keeping up with the latest threats to the enterprise’s wireless network can help us identify weaknesses andfind ways to strengthen our defenses. Wireless networks lack in common security tools used by wired networks. Firewalls, intrusion detection systems, anti-virus and malware detection