Hello, Please find the attachment. This is an action plan. I need to add IRT Charter to my assignment. (scope, team members, etc.) Feed Back from professor. You were asked to provide an IRT

TELECOMMUNIATION COMPROMISE 1

Operations Security

Scenario 8: Telecommuting Compromise













Table of Contents

Introduction 4

The order of the processes to be followed 4

Roles 5

Training 5

Incidents 6

Incident response 7

The difference between VPN setting Proxy and open IP address proxy 7

Incident response plan 8

Incident Notification 8

Reporting/tracking 9

Advantage of VPN usage with ID 10

Procedures 10

Risk 11

Preparation 11

Effects of viruses on servers 12

Detection and Analysis 12

Containment 13

Incident handling 13

Recovery 14

Conclusion 14

Introduction

The process of telecommuting compromise occurs in the business environment and uses any methods that store, process, or send information. The events that are happening and the significant events affected should be reported to relevant personnel. Also, the person responsible for identifying and responding to security incidents should know how to recognize when security involved so that they can coordinate with the chosen privacy officer. For individuals with responsibilities, basic training is implemented by implementing a form exercise routine, as all staff members have obligation and responsibility for participating in the activity. The telecommunication company has to invest a lot in the production system of security. The security system should be well implemented so that the transaction process can run effectively.

The order of the processes to be followed

Software that detects and stops non-device software should be used in the company. The protection of malware should be done at a lower level, for example, server systems and work operations. At a higher level, for example, email servers, web agents, and at the client application level, for example, customers for emailing, fast messaging customers. The security level requires the code protection process to be implemented as follows (Hudson, 2018). The code is designed to perform system-specific settings every 12 hours, and the entire system is deleted every 72 hours. Install malware scanning software, make important file system files every 12 hours, the entire system is viewed every 72 hours. Also, the malicious code protection program should be changed each time security management policies, and procedures provide a new delivery.

Roles

Calling the user of the system at home should be the first activity in the telecommunication control system. The telecommunication represents the organization’s growth, distribution, and periodic review. It is first used because it describes a modification of response documents under the control Series (Hudson, 2018). It includes official, written, event-based activities that mention goals, scope, responsibilities, accountability, management, coordination, and compliance between organizations. The formal documentation procedures to facilitate incident response and Implementation of the reaction. It provides a process to help implement the Control Series to ensure that the system's intervention. It is a means for implementation of security information for the companies in the world. The intervention measures should also be well implanted in the runtime of the programs.

Training

The user should then disable the user ID. This regulatory series covers the development of policies and procedures for implementing selected privacy controls in the series. Policies and procedures indicate relevant federal laws, performance directives, instructions, regulations, standards, policies, and guidelines in response to and maintaining activities. The CMS Collaboration Center (CCIC) connects to the Event Management Team (IMT). The last option is to disconnect the VPN section in the system. The team ensures compliance with the procedures of the Chairman's response and provides guidance and support to all CMS components and contractors. The intention is to take corrective action to reduce security information and privacy incidents. VPN system represents an essential aspect in the security system and therefore, should be put into consideration while implementing.

Incidents

Preparing method management for regular events has to establish the ability to handle events. It makes the organization to respond to circumstances that hinder occasions by ensuring that applications, systems, and networks are secured. Sometimes the occasion response team is usually not influenced for blocking events; it is based on the success of the event responding. By completing the list of events in, make sure the person is prepared to handle the security of information and privacy events. This list should be checked annually and updates to the incident response plan. The system should ensure that standard practices are implemented to prevent information security and privacy issues. This report generates a clear overview of some of the suggested exercises for accessing systems, networks, and applications.

Incident response

The risk assessment of the system and request frequency should identify the risk and the combination of threats and weaknesses. It should include potential dangers, including specific corporate threats. Priority should be given to each risk and risk reduction, transfer risk, or transfer chance. Accept until the general risk level is reached. Another advantage of regular risk assessment is the ability to identify critical resources and allow employees to emphasize monitoring activities and responses to these resources. The assessment of risk requires at least an annual evaluation of risk results and evaluation of risk at least every three years or Update when significant changes occur. Use powerful methods to defend against, destroy systems, services, or networks such as DDoS.

The difference between VPN setting Proxy and open IP address proxy

Users must be aware of procedures and policies related to the proper use of the network, systems, and applications. Policies and procedures for protecting non-digital forms of data should be considered. Lessons from recent events should be joint with users to assess the actions of users affecting the organization (Mishra, 2017). It should reduce user understanding of events in the loop. IT staff should be taught to maintain networks, systems, and applications by organizational security standards. All users should be informed to protect the copied cardboard/paper. The security level requires all regular users to ensure security and privacy every year. The training of incident response is included in safety and health training. Available to all EU consumers before and every time an account is released.

Incident response plan

The IT Assistant service, which will open the remedy ticket that builds the shell ticket in the Risk view (Fay, 2017). An information security policy can be defined as a set of high-level information designed to protect data in an organization using the VPN proxy. Telecommunication Company describes systems and procedures for the protection and management of information access. Information systems follow policies and federal laws. Specifically, they mention the following strategies for the control series. The software should develop and maintain a control family to build the ability to manage information system events. They include preparation, identification, analysis, inclusion, recovery, and user response activities.

Incident Notification

Events are monitored, written, and reported in the VPN server. It develops and maintains the best implementation of information security and privacy control and control for the control Series. It records, preserves, and submits policies and procedures. It also manages security responsibilities and violations of information and events, by Information Technology. It ensures status and contractors. The system receives security system information and privacy precautions, recommendations, and instructions for selected external organizations. Information and privacy information, notes when necessary (Mishra, 2017). It distributes security information and privacy information, recommendations, and guidelines to employees. It ensures awareness and contractor related events — accurate information on SOPs for all activities related to Telecommunication.

Reporting/tracking

It is challenging to use all the power using standard settings. In addition to ensuring the security of each army, troops should follow minimum preferences and provide users with only the necessary opportunities to perform authorized tasks. The military should conduct inspections and should enter significant security incidents (Hornung, 2017). Protests should continue to be monitored. Many organizations use the Software Security Control System to help support troops efficiently. The security level requires the implementation of a baseline configuration baseline. The United Nations Government Benchmark Configuration Benchmark (USGCB) and the National Control System (NCP) initiate it. It is expected to disrupt or deny access to services or attacks; such as passwords, CAPTCHAS, or numbers signature. Attack a web application or website.

Advantage of VPN usage with ID

Continue to calculate information system components to identify these functions, storage, and processes. The right approach helps to implement appropriate information and privacy controls, and it is essential to prevent, detect, and respond to news security issues. Ensure that the preparation and prevention methods are included in the incident. It is a plan to process the information system, which occurs at least annually (Palucha, 2017). For more information on test event response, use the Event Response Plan or report on developing an incident response plan. Use the secret code as a link on a malicious website in an encrypted document or email body. Attack-related is problematic. People in a nuclear attack, bad points in wireless access, and query injector (SQL) injections involved.

Procedures

Ensures that the contractor maintains the process of handling events and processes. It periodically reviews and modifies response events as described in the system. II ensures that contractors maintain responsiveness to procedures and processes through regular exercise. CISO works with the CCIC, Information System Organization (ISO) to establish and maintain information security and privacy incidents. To be able to handle violations, including preparation, identity, restrictions, and damage. , the ability to recover and monitor information and privacy incident security information and violation information (Palucha, 2017). It provides methods, procedures, and standards within RMH to facilitate the implementation, validation, and monitoring of the effectiveness of the crisis control series.

Risk

It defines systems and policies for the protection and management of information access. Information systems by follows policies and federal laws. The procedures section of this book describes the specific process for meeting the security requirements. These procedures have been set up based on the current implementation of these documents. Rates include particular requirements for implementing and supporting the security implementation of an information security policy. It defines specific standards for each security Control according to the procedures and policies (Bernardino, 2017). This manual provides guidance and best practices to help support standards, or as a reference when there are no standards.

Preparation

The network cycle should be organized to cast-off all processes that are not allowed. It includes getting all the connection- points, like VPNs and volunteer relationships with other companies. Security level requires an information system rebuttal in hosting settings. By default, network communication networks allow traffic to be networked for differentiation, i.e., reject all, discriminate permissions (Turner, 2019). The antivirus directive should be updated when it is closed. Malicious protection methods should be configured with encryption and code encoding and send an alert to the administrator to respond to the Identification code. Attack a script attack used to rob reputation or point it to a website that uses browser vulnerabilities and malware installations. Attack by email or attachment to steal important information.

Effects of viruses on servers

Prepare for a standard attack vector. The carrier of the following attacks should not provide a clear definition of the event. Instead of typing the usual attack method, it can be used as the basis for identification. Attacks that can be eliminated by media or peripherals, for example, the lousy code is propagated from a standard USB drive (USB) to the system. Any event caused by an authorized user violating the use of the acceptance, excluding the above categories. Define features that measure the expected activity to identify these changes quickly. A hidden example is to implement a file loyalty program to the host to get the checksum of essential files and use the bandwidth-monitoring network to determine the average.

Detection and Analysis

Guides can be included, translated, or provided with guidance for implementing strategies and can also guide a variety of IT systems. This guide is recommended for good practice, but you do not need to follow this policy. This guide is intended to adjust some procedures according to routine or workout. This guide provides guidance and best practices related to it. The program provides detailed instructions on how to implement specific safety controls and meet the standards specified in the standard Turner, 2019). This section contains the corresponding steps that are enabled. The family's security controls are applied according to the requirements of ISO.

Containment

The purpose of the crisis answer is to prepare individuals to prevent, investigate, and address security and privacy issues and to ensure that the system meets the requirements. The response to the emergency response should be similar to the roles and responsibilities are given in the response plan. For example, the answer to incident response is used by the system owner (SO), information owner, and information officer (ISSO). Employees regularly receive sensitive data such as names, social security numbers, and health records. They have to perform message reception annual response training as part of general training security awareness.

Incident handling

The signs of the event are divided into two groups: seniors and indicators. The predecessor is a sign that affairs can happen in the future. This indicator indicates that the game may or may not occur now. Identify predecessors and indicators by using a variety of sources, as well as computer security programs, sizes, public information, and people. Report the activity using the procedures mentioned in the Participation Activity Repor (Green, 2019). After the IMT report and IR's real audience analysis event, the following is a recommendation in the Computer Security Help Guide for simple and more efficient event analysis. The user is placing the application in a shared file, resulting in the loss of essential data; or the user is performing illegal activities on the system.

Recovery

The Manager will establish, implement, and implement a system to facilitate response to incident response reports, including Health Information Reporting (PHI) to ensure accurate and timely information on HHS. In this section, Information Security will ensure implementation of policies and procedures related to information security and privacy information responses. The system will approve and promote enterprise security systems and privacy awareness. To increase monitoring, each order is set in the connection control using the control number. Users should be aware that the Domestic Tax Law requires organizations that accept Federal Tax Information (FTI) to provide appropriate safeguards (Turner, 2019).

Conclusion

It ensures the confidentiality of FTI. The training of incident response is one of the protections to implement these requirements. Information Security will provide an event response. The users of information systems are similar to the roles and responsibilities are given to them each year when they assume responsibility or response. Ordinary users only require to identify who is calling to identify events in the system information. Administrators may need extra training on how to repair activities, and event participants can get more specific training. The sequential arrangement of the activities shows the implementation procedure for the whole system in the company. Telecommunication agency should consider some of the security vulnerabilities of the devices.

References

Bernardino, A., (2017). Telecommuting: Modelling the Employer's and the Employee's Decision-Making Process. Routledge.

Fay, M. J., (2017). Telework. The International Encyclopedia of Organizational Communication, 1-9.

Green, C. R., (2019). Examining the Effects of Negative Work Outcomes on Telecommuting (Doctoral dissertation, Middle Tennessee State University).

Hornung, S., (2017). Research on Idiosyncratic Deals: A Selective Review and Synthesis. Recent Developments in Social Sciences: Political Sciences and International Relations, 7.

Hudson, K. S. (2018). Telecommuting Experience (Doctoral dissertation, Northcentral University).

Mishra, G. S. (2017). Estimating the Travel Behavior Effects of Technological Innovations from Cross-Sectional Observed Data: Applications to Carsharing and Telecommuting. University of California, Davis.

Palucha, A. M. (2017). Telecommuting Across the United States: A Phenomenological Study (Doctoral dissertation, Capella University).

Turner, J. E., & Galloway, A. E. (2019). Discovering Cyber Indicators of Compromise on Windows OS 10 Clients Using PowerShell and the. Net Framework. Naval Postgraduate School Monterey United States.