Edudorm Facebook

Cyber Security Inc.

Cyber Security Inc.

GAP ANALYSIS

Where they are 

It is factual that many organizations learn how to respond to an emergency situation after security attack incidents (Microsoft, 2016). As a result, it becomes more costly for the company to deal with the emergency than it could have been if the firm planned prior to occurrence of the attack. This means that the most effective way of handling emergencies is by planning for an appropriate response to a potential risk that can materialize in the firm (Microsoft, 2016). Therefore, in Cyber Security Inc., the firm security is dominated by a certain level of awareness that is achieved before implementing a team to respond to emergencies.

Where they should be

However, prior to creating the awareness in the firm regarding the emergencies, it is recommendable to conduct effective planning together with an operational emergency response and management team (Microsoft, 2016). Precisely, Cyber Security Inc. should effective plan for emergency management and implement an operational team that will respond to an attack. Furthermore, the company should conduct an emergency network operations plan (Antonopoulos, 2011). This plan will help the firm decide on what is required to continue running, security measures to be adopted and how to effectively communicate and implement security response strategies. A network is composed of all elements required to keep the emergency response strategy running. Some of these elements include operations, response team, assets and funding among others (Antonopoulos, 2011). As a matter of fact, Cyber Security Inc. should have already minimized the number of potential security incidents together with their severity. This can be achieved by establishing effective policies and procedures to be followed in order to guarantee the desired level of security. Additionally, security incidents materialization can be minimized through establishing security training programs to the employees which will minimize the vulnerability of the firm in general (Antonopoulos, 2011).  

How they will get there  

In order to achieve the desired organizational goals regarding the emergency response strategies, the firm should make sure that the task of emergency network operations planning is assigned to specific employees (Microsoft, 2016). This will guarantee effective implementation of the plan. The selected team will focus on assessing network environments, documenting operations and monitoring the performance of the operations (Microsoft, 2016). Prior to forwarding the documented operations to the emergency response team, there will be a certain level of awareness already created before implementing the response. Generally, the organizational objectives for the emergency response planning include minimizing severity and number of security incidents, defining the emergency response plan, containing the damage, and assembling an effective response team (Microsoft, 2016).    

References

Antonopoulos, A.M., (2011). Lockdown: how would you handle emergency network operations? Network World. Retrieved from http://www.networkworld.com/article/2178618/malware-cybercrime/lockdown--how-would-you-handle-emergency-network-operations-.html

Microsoft, (2016). Responding to IT security incidents. TechNet. Retrieved from https://technet.microsoft.com/en-us/library/cc700825.aspx

 

OUTLINE

Internet Security Firm

Introduction

  • Most of the organizations today are selling and having different operations on the online platforms
  • One of the vital factors for consideration while using online platforms is the security of data, information, money and the website at large

Company Overview

  • Cyber Security Inc. will seek to provide security to most of the internet users
  • The business will be registered as a private company
  • The headquarters of the company will be located in New York
  • Cyber Security Inc. will seek to provide the most reliable internet security globally
  • Other services include consultation, fraud prevention, cyber security software, and identification and access management

Gap Analysis

  • Current security and emergency situations management

 

References

Antonopoulos, A.M., (2011). Lockdown: how would you handle emergency network operations? Network World. Retrieved from http://www.networkworld.com/article/2178618/malware-cybercrime/lockdown--how-would-you-handle-emergency-network-operations-.html

International Business Publications, USA. (2007). China E-commerce Business and Investment Opportunities Handbook. Intl Business Pubns USA.

Kaspersky,. (2016). Kaspersky Personal & Family Security Software. Kaspersky Lab United States. Retrieved 18 October 2016, from https://usa.kaspersky.com/internet-security-center/threats/top-7-cyberthreats#.WAYJ7NJ97cs

Microsoft, (2016). Responding to IT security incidents. TechNet. Retrieved from https://technet.microsoft.com/en-us/library/cc700825.aspx

Oxford, B. G. (2014). The Report: Colombia 2014: 2. London: Oxford Business Group.

Taylor H. (2015). Huge cybersecurity threats coming in 2016. CNBC. Retrieved 18 October 2016, from http://www.cnbc.com/2015/12/28/biggest-cybersecurity-threats-in-2016.html

 

688 Words  2 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...