| IT Security Consultants, Inc.
555 East 1000 South, Salt Lake City, UtahPhone Number: (801) 555-0100 Fax: (801) 555-0110 | 2/23/2009 | | | FTD Enterprises | Request for Proposal | | Brandon Moore
Justin JoosBrandon LittleMark PetersonJason Kilgore | |
**This document meets a request for proposal from FTD Enterprises to implement a security infrastructure and other tasks stated in the proposal. |
Table of Contents
Company Overview 3
Project Team Staffing 4
Executive Summary 7
Scope, Approach, and Methodology 8 Risk Assessment 8 Problems and Solutions 8 Assumptions 13
Project Management 14 Resources 14 Task List 15 Network Topology 24
Deliverables 29
Budget 30
Appendix: Detailed Budget 33
…show more content…
Justin has his Bachelor’s Degree in Computer Science, and an MBA in Business Administration.
Project Team Staffing
Jason Kilgore — Sales Director Jason Kilgore joined IT Security Consultants, Inc. in 2005 and began a successful sales career culminating in his role as Sales Director. Jason recruits, develops, and manages the sales team and is responsible for the overall coordination and leadership of all sales activities to meet the needs of IT Security Consultants, Inc. customers and the objectives of IT Security Consultants, Inc .’s business plans and strategies. Jason also provides expert advice on Linux solutions to the company infrastructure. Prior to working at IT Security Consultants, Inc ., Jason was a General Manager and a corporate trainer with The Discovery Zone.
Jim Halgren — Information Systems Manager
Jim joined Capstone Securities in 2003 and has grown in various positions to his present position which he has held since 2005. He is responsible for the company’s advanced IT infrastructure including: system and application software, computers and servers, and communications. His education includes an Associate’s Degree in networking, a Bachelors Degree in Information Security and a Masters Degree in Computer Science. Jim is no stranger to network security and implementation of networks, having spent 7 years as
In the final chapter of CompTIA Security + Study Guide eBook, it covers some great topics, key elements of implementation, support, and managing the security efforts in a company or organization. It’s important for IT Professionals to understand their role in a company/ organization. It’s also extremely important for them to understand the boundaries of security within that company/organization. Adopting best security practices while adhering to company policies will ensure that both parties are happy. There are many fines lines with security management.
Key roles that will play a big part in the completion of this project will pertain to network security and reliability and client confidentiality.
How do you secure something that is changing faster than you can fix it? The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, is still has security problems. It is being used for a purpose for which it was never intended: commerce. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within,
The establishment of the internet has connected nearly 3 billion people today, but in today’s society, the word “privacy” is becoming controversial. We have to deal with this every day when using social media, forum, checking our emails, even online transaction. The article, “An Encrypted Internet Is a Basic Human Right”, published August of 2015, written by Nico Sell who is the co-founder and co-chairman of Wickr Inc. implying that laws and policies are the usurping power used against businesses and consumers. She integrated the ideas of George Washington as the great leader that empowers people and the establishment of the U.S Postal Service as a civil liberty.
Dr. Blahblah has implemented a system with an 8-bit random canary that is used to detect and prevent stacke-based buffer overflow attacks. Describe an effective attack against Dr. Blahblah’s system and analyse its likelihood of success.
NIST (2011), Managing Information Security Risk -- Organization, Mission and Information System View, National Institute of Standards and Technology Special Publication 800-39.
Internet security are such a big thing because many things are based off the internet. As in most of the storage is done off of cloud storage, so you don’t need lots of storage in your computer. Which makes internets unsafe because anyone could hack into your account and take your information. Like your bank account and your personal accounts that could really hurt you I the long run. Or someone could put a scam on a common website that most people go on. And could hack everyone’s computer that has the scams. Another way of spamming is by hacking into someone else email and sending them spam that looks like legitimate with a subject or message. Fooled sender email addresses, logos, trademarks, and the wording used in the message will often add to the trick.
The bank’s information security posture needs improvement base based on the number of deficiencies detailed thought this ROE. However, to management credit and to further strengthen the security process, on November 21, 2017, management decided to outsource the Chief Information Security Officer (CISO) position with a qualified IT security firm. Management contracted GRC Solutions to act as the bank’s CISO. Mr. Frank Getter, Senior Consultant at GRC Solutions will perform the functions as the new CISO. Mr. Getter is a Certified Information System Security Professional (CISSP) with over twenty years of experience in the information technology management, operations and information security field. Mr. Getter appears to have the necessary
Would you like someone to assist you in reducing the cost and complexity of your practices technology while also greatly increasing the overall security of your businesses networking and computer infrastructure?
The concern about privacy on the Internet is increasingly becoming an issue of international dispute. ?Citizens are becoming concerned that the most intimate details of their daily lives are being monitored, searched and recorded.? (www.britannica.com) 81% of Net users are concerned about threats to their privacy while online. The greatest threat to privacy comes from the construction of e-commerce alone, and not from state agents. E-commerce is structured on the copy and trade of intimate personal information and therefore, a threat to privacy on the Internet.
This preliminary information security risk assessment for Southern California Design (SCD) is designed to provide a high-level overview of the company’s computer assets, along with the threats and vulnerabilities to those assets. The risk analysis section provides data on existing security controls, the likelihood and consequence of each type of incident, and the risk levels. The risks are then prioritized and nine assets are outlined in the risk register table for ease of reading. Finally, suggested general treatments are provided to address the risks that have been identified. For the extreme and high level risks that result from theft, hacking and malware the company should implement controls to reduce the
Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenables customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail and energy. (Tenable, 2016)
Experienced professional with a developed focus on Governance, Risk Management, and Compliance (GRC). Successfully served in multiple roles of escalating responsibility and expertise during a 20+ year career working directly with Information Security Systems Technologies. For example; administration, support, engineering, architecture, analyst, and management teams. A hybrid acumen and heightened ability to identify, analyze, understand, communicate, and execute, while balancing technical complexities with business requirements. Strives to infuse added-value and is extremely accomplished in achieving both short-term objectives & long-term company goals through relationship building and strategic planning. A critical thinking, hands-on, Technologist with detailed knowledge of related business intricacies.
This present reality capacities of gear are getting up to speed to the ideas and guarantees of the most recent couple of years. It is frequently said that the main consistent in life is change. For security directors confronted with advancing obligations, more assorted dangers, a less steady work power, and regularly creating innovation, that adage is very obvious. Yet, a more intensive take a gander at this new environment proposes that, shockingly, the greater part of the progressions is working to support security. To some degree, what will make the following couple of years diverse for security operations is that this present reality capacities of hardware are making up for lost time to the ideas and guarantees of the most recent couple of years. As PC and information transmission advancements keep on improving, as the highly advertised Internet develops, and as security hardware costs descend, organizations are changing the way security offices work, both as a unit inside security 's space and as a capacity inside the partnership "Individuals are more touchy to security needs and the way that we are here to ensure
This paper was prepared for Network and Security Systems, CISK 445, taught by Dr. Marco A. Villarreal