Posted: April 16th, 2022
Intrusion Detection System
Intrusion Detection System
Part A
An intrusion detection system will be used in the organization to monitor network traffic by looking for any malicious activities and threats. The IDS will be able to send alerts and signals to notify users when any threat is detected hence making it easy to conduct an emergency response and prevent further damage from taking place in the organizational systems (Liao et al., 2013). Therefore, the organization will need some additional employees who will be on the lookout to ensure that the new software functions effectively and responses. The employees will be informed on the source address of the malicious attacks, whose information is being targeted, and the nature of the attack that is about to take place.
Three more employees will be required, one of them will be a savvy IDS analyst who will be tasked with the responsibility of shaping the interest and the needs of a particular site. An executive sponsor will be required to support the organization in term financial funding. An implementation officer will also be required for the purpose of ensuring that the software use is implemented and to ensure that the employees are at per within the organization and the person responsible for it. A quality assurance officer will be responsible for ensuring that the systems meet the regulatory requirement of the organization.
In a normal situation within an organization, a software developer is responsible for installing, testing, and monitoring the IDS systems. He or she has a duty to ensure that the employees get appropriate training and update the CEO and the CIO on any adjustments and updates that need to be performed on the systems. A software database administrator shares information to the CEO and the CIO when there is a potential threat in the systems whose source. The database administrator ensures that the organization’s sensitive data is well secured through appropriate storage and making it available the executives when needed.
An IDS analyst works hand in hand with the systems developer to ensure that the needs of the organization are met during the development of the systems. The IDS implementation is quite costly and heavy financial investments will be required. Therefore, a quality assurance officer will make sure that the implementation of the systems will add value to the business to cover the expenses in the implementation process. Lastly, the implementation officer will be tasked with the responsibility of planning on the new software, communicating the progress of the implementation, training of employees on how to make use of the systems, and to ensure that the systems are installed effectively. The implantation officer will also be responsible for monitoring the performance of the systems.
Part B: Infographic
Job Title How they fit with Cybersecurity team Certification
IDS analyst Ensures that the needs of the organization and the cybersecurity team are in sync and are met by the new IDS system. Global Information Assurance Certification (GIAC)
Implementation officer Trains the employees on how to make use of the IDS systems Global Information Assurance Certification (GIAC)
Quality Assurance Officer Makes sure that the IDS system adds value to the organization.
Ensures that the IDS is up to standard with the organizational standard that is well known to the cybersecurity team.
International Software Testing Qualification Board (ISTQB).
Having the IDS integrated into the organizational networks and systems will be of great benefit as threats will be detected early enough giving the team ample time to respond before the attack advances to beyond repair levels.
Reference
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
Intrusion Detection System