Preview

University of Technology Cloud Intrusion Detection and Intrusion Prevention Security Policy and I

Powerful Essays
Open Document
Open Document
3219 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
University of Technology Cloud Intrusion Detection and Intrusion Prevention Security Policy and I
Security Policy
For
The University of Technology Jamaica
[pic]

Case Study

Intrusion Detection (IDS) and Intrusion Protection (IPS) systems are two areas that are becoming popular in securing cloud computing environments. You have been hired to setup a UTECH Cloud IDS and IPS security policy within the University of Technology where all system resources will be managed as a part of an open public and private cloud. To maintain the ubiquity of all these resources within UTECH , you are hired as the new security personnel within the IS and Audit department with responsibility for UTECH’s Intrusion Detection and Protection System especially with respect to it’s compute cloud resources. Highlight all the salient issues of a security policy that you would have to develop in managing all these resources.

Introduction

Computer security is the process of preventing and detecting unauthorized use of a computer. Prevention measures helps to stop unauthorized users from accessing any part of the computer system. Detection helps to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done

It also entails the protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats.

Software application which provide firewall information security and virus scanners are not enough on their own to protect information. A set of procedures and system needs to be applied to effectively deter access to information (Crystal, G. 2010). Hence a combination of security policies, products and procedures must be employed.

Cloud Computing
Cloud computing describes computation, software, data access,



References: SECURITY IMPLICATIONS OF CLOUD COMPUTING Narendran Calluru Rajasekar November 30th, 2009 http://www.focus.com/fyi/it-security/ids-vs-ips/ http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm http://www.net.isc.upenn.edu/policy/approved/20100308-computersecurity.html Wikipedia, the free encyclopedia Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security file:///C:/Users/Nicola/Downloads/UTech%20Security%20Policy%20February2010.webarchive

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    g. Security software limits access to programs and data files, and keeps a log of programs and files that have been accessed, which is then reviewed by the security manager daily. Category: 4.3.1, Assertion: Any Assertion…

    • 757 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. Information security is necessary for protecting confidentiality, privacy, integrity of processing, and availability of information resources. (Correct. As Figure 8-2 shows, security is the foundation for achieving the other four components of system reliability.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats. Information security is composed of computer security and communications security. Also called…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer security is made up of digital forensic, network security, and preventing malware, and is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer security managers will increase in years to come.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Scope: Access control is the process of determining which users are allowed to perform what operations on which objects in a computer system. Healthcare information systems contain sensitive information about patients that is vital in the treatment process. Procedure:…

    • 458 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    In recent years, countries around the world have been developing rules and regulations which are designed to support data confidentiality and security. Many organizations have spent decades on building stronger defenses against intrusion, including firewalls, anti-virus software, email security, identity access badges, security policies and procedures. These protections have made the business world more effective at blocking threats and attacks from the outside and made it increasingly difficult for hackers and viruses to penetrate into the system. However these protections provide only a first line of defense since it is designed to prevent unauthorized access.…

    • 4039 Words
    • 17 Pages
    Best Essays
  • Powerful Essays

    Inf 103: Computer Literacy

    • 1963 Words
    • 8 Pages

    These companies are different within their own right, yet offer a similar service to every customer they do business with. Not only do these companies offer the opportunity and availability of a product that will allow them to communicate with their peers in business projects with complete security regardless of where they are in the world. No longer will you have to show up at a brick and mortar building to collaborate on a project…

    • 1963 Words
    • 8 Pages
    Powerful Essays