Essay Sample on Designing Security System to Protect Privacy: Guidelines for DoD Dept

Paper Type:  Research paper
Pages:  4
Wordcount:  865 Words
Date:  2023-04-08
Categories: 

Introduction

To design a security system that protects privacy, it is essential to follow specific procedural guidelines. The DoD department keeps crucial information about their endeavors in defense that would not want other unauthorized figures to access. The general procedure that needs to put into consideration should revolve around Data collections, storage, usage, retentions, and destruction practice and procedures (Nicho, 2018). The organization needs to comply with the general procedures that govern all the methods that protect organizational data during the installation of a security system in an organization. The general process should follow the following data life cycle as shown in the figure below, to comply with Domain regulations

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The scope of IT compliance comes in all shapes and sizes based on the presentations in systematic and measurable assessments that need to be put into considerations within organizational environments. The military deployed networks are also shown to have unique challenges within the purview of the infrastructure homeland networks. The leakages in information in the military operation and government agencies are mostly attributed to lack of adequate training and guidance of the operational staff and deployed or temporary network.

Information security needs to put up basic plans to ensure that they take care of their vulnerable areas that would put the public at risk. The implementation of IT security management systems will prevent the cases of data breaches and the resulting negative consequences to government agencies and military data networks (Petrocelli, 2016). There will be the use of several security tools that include firewalls, Proxy servers, Intrusion Detection Systems, Host-Based Intrusion Detection Systems, Patch management Systems, antivirus protection, and encryption.

Firewalls

Firewalls will be implemented in hardware and software forms in a design that is meant to prevent unauthorized access to the private network of the organization. All messages for the organization, entering or leaving the intranet, will have to pass through the firewall that will examine them and block the ones that do not meet the specified criteria for security (Nicho, 2018). The organization will mainly use the web application firewall in the form of a server plug-in that applies the rules of HTTP conversation.

Proxy Servers

It is the intermediary between a web browser with a private IP address and another server on the internet. The implementation will involve installing the software system on admin computers to act as the intermediary (Petrocelli, 2016). It will function to hide the IP address because it has its own that acts as a shield, masking that of the user. Running the proxy server will be a valuable extra layer of protection of the sensitive core business systems of the organization.

Intrusion Detection Systems

It is the system that monitors the network traffic to discover any suspicious activities and issue alerts. The implementation will involve installing the systems and, more so, the network intrusion detection system. It observes the passing traffic and matches it to the collection of known attacks. The systems will use both signature-based methods and anomaly-based method on attackers.

Host-Based Intrusion Detection Systems

They are intrusion detection systems that run on the network devices of the independent hosts. The duty is to monitor the incoming and also outgoing packets from the device and alert the concerned administrator if they detect that malicious activities are going on in the devices (Nicho, 2018). The implementation will include installing the systems on all the devices on the network of the organization such that people are monitored, and the administrators do their investigation job quite well.

Patch Management Systems

The implementation consists of applying updates across the systems of the organization to resolve code vulnerabilities. These software codes have vulnerabilities that make hackers to continually try and discover them to infiltrate a computer or the more extensive network and access the database (Petrocelli, 2016). The system allows the software developers to stay ahead of the game and find security holes and so offer a software update to resolve such issues. There will be download, installation, testing, and monitoring of the software patches. The organization needs to make patch management a standard practice.

Antivirus Protection

Implementing antivirus protection makes use of antivirus solutions available through vendors. Virus infection could be on emails, local area networks, macros, and the antivirus provides protection against infections (Petrocelli, 2016). The organization will ensure the implementation of an intrusion detection system. It acts as a layer of protection against specific denial of service attacks, and they also have the ability to block various forms of virus exploits.

Encryption

End-to-end encryption of data helps in maximizing the protection despite whether the data is public or private. Organizations can rely on encryption because properly implemented cryptosystems ensure that intruders do not access information. It is crucial that the organization has email encryption because it is where all information is passed and the relevant documents (Nicho, 2018). Generally, building a strategy that works for the organization will ensure that they are careful with data access and that only authorized people get to know valuable information.

References

Nicho, M. (2018). A process model for implementing information systems security governance. Information And Computer Security, 26(1), 10-38. https://doi.org/10.1108/ics-07-2016-0061

Petrocelli, T. D. (2016). Data protection and information lifecycle management. Upper Saddle River, NJ: Prentice-Hall Professional Technical Reference

Cite this page

Essay Sample on Designing Security System to Protect Privacy: Guidelines for DoD Dept. (2023, Apr 08). Retrieved from https://proessays.net/essays/essay-sample-on-designing-security-system-to-protect-privacy-guidelines-for-dod-dept

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism