Introduction
To design a security system that protects privacy, it is essential to follow specific procedural guidelines. The DoD department keeps crucial information about their endeavors in defense that would not want other unauthorized figures to access. The general procedure that needs to put into consideration should revolve around Data collections, storage, usage, retentions, and destruction practice and procedures (Nicho, 2018). The organization needs to comply with the general procedures that govern all the methods that protect organizational data during the installation of a security system in an organization. The general process should follow the following data life cycle as shown in the figure below, to comply with Domain regulations
The scope of IT compliance comes in all shapes and sizes based on the presentations in systematic and measurable assessments that need to be put into considerations within organizational environments. The military deployed networks are also shown to have unique challenges within the purview of the infrastructure homeland networks. The leakages in information in the military operation and government agencies are mostly attributed to lack of adequate training and guidance of the operational staff and deployed or temporary network.
Information security needs to put up basic plans to ensure that they take care of their vulnerable areas that would put the public at risk. The implementation of IT security management systems will prevent the cases of data breaches and the resulting negative consequences to government agencies and military data networks (Petrocelli, 2016). There will be the use of several security tools that include firewalls, Proxy servers, Intrusion Detection Systems, Host-Based Intrusion Detection Systems, Patch management Systems, antivirus protection, and encryption.
Firewalls
Firewalls will be implemented in hardware and software forms in a design that is meant to prevent unauthorized access to the private network of the organization. All messages for the organization, entering or leaving the intranet, will have to pass through the firewall that will examine them and block the ones that do not meet the specified criteria for security (Nicho, 2018). The organization will mainly use the web application firewall in the form of a server plug-in that applies the rules of HTTP conversation.
Proxy Servers
It is the intermediary between a web browser with a private IP address and another server on the internet. The implementation will involve installing the software system on admin computers to act as the intermediary (Petrocelli, 2016). It will function to hide the IP address because it has its own that acts as a shield, masking that of the user. Running the proxy server will be a valuable extra layer of protection of the sensitive core business systems of the organization.
Intrusion Detection Systems
It is the system that monitors the network traffic to discover any suspicious activities and issue alerts. The implementation will involve installing the systems and, more so, the network intrusion detection system. It observes the passing traffic and matches it to the collection of known attacks. The systems will use both signature-based methods and anomaly-based method on attackers.
Host-Based Intrusion Detection Systems
They are intrusion detection systems that run on the network devices of the independent hosts. The duty is to monitor the incoming and also outgoing packets from the device and alert the concerned administrator if they detect that malicious activities are going on in the devices (Nicho, 2018). The implementation will include installing the systems on all the devices on the network of the organization such that people are monitored, and the administrators do their investigation job quite well.
Patch Management Systems
The implementation consists of applying updates across the systems of the organization to resolve code vulnerabilities. These software codes have vulnerabilities that make hackers to continually try and discover them to infiltrate a computer or the more extensive network and access the database (Petrocelli, 2016). The system allows the software developers to stay ahead of the game and find security holes and so offer a software update to resolve such issues. There will be download, installation, testing, and monitoring of the software patches. The organization needs to make patch management a standard practice.
Antivirus Protection
Implementing antivirus protection makes use of antivirus solutions available through vendors. Virus infection could be on emails, local area networks, macros, and the antivirus provides protection against infections (Petrocelli, 2016). The organization will ensure the implementation of an intrusion detection system. It acts as a layer of protection against specific denial of service attacks, and they also have the ability to block various forms of virus exploits.
Encryption
End-to-end encryption of data helps in maximizing the protection despite whether the data is public or private. Organizations can rely on encryption because properly implemented cryptosystems ensure that intruders do not access information. It is crucial that the organization has email encryption because it is where all information is passed and the relevant documents (Nicho, 2018). Generally, building a strategy that works for the organization will ensure that they are careful with data access and that only authorized people get to know valuable information.
References
Nicho, M. (2018). A process model for implementing information systems security governance. Information And Computer Security, 26(1), 10-38. https://doi.org/10.1108/ics-07-2016-0061
Petrocelli, T. D. (2016). Data protection and information lifecycle management. Upper Saddle River, NJ: Prentice-Hall Professional Technical Reference
Cite this page
Essay Sample on Designing Security System to Protect Privacy: Guidelines for DoD Dept. (2023, Apr 08). Retrieved from https://proessays.net/essays/essay-sample-on-designing-security-system-to-protect-privacy-guidelines-for-dod-dept
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Essay Sample on Video Games and Programming
- What Is Wrong With Big Data Today in Contract Management? - Essay Sample
- Research Paper on Transition of Bookkeeping From Paper to Electronic Data
- Research Paper Example on Summary of Google Inc
- Essay Example on Online Security: A Must-Have Tool to Guide Clients?
- Essay Example on Cloud Computing: Front-End & Back-End Explained
- Paper on Raster Graphics: A Digital Image Format Using Pixels & Graduated Tones