This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Discovery Plan Policy for Digipro Media

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

 

 

 

Discovery Plan Policy for Digipro Media

Student’s Name

Course Title

Faculty Name

Overview of DigiPro

DigiPro is a data privacy firm focusing on ensuring that their clients’ data is protected against any unauthorized access. According to Bertino, “data security and privacy is a crucial part of any organization because it creates a sense of security and reliability” (Bertino, 2016). The gravity of data security across the globe prompted the development of DigiPro in the year 2014 to counter unauthorized data access in most organizations leading to cooperate espionage and loss of revenues. DigiPro’s principal objective is to ensure that clients receive real-time data security through updated software that warns clients to access their data. The organization also offers data recovery plans for organizations when their data is obtained illegally through hacking on unauthorized access. The firm likewise provides consultancy services to organizations in regards to the latest forms of database management systems that cannot be easily hacked.

Structure of the DigiPro Organization

The management organization of DigiPro is a hierarchical type, with the CEO being at the topmost level.  The CEO oversees all the organizational operations, makes all the crucial decisions that are related to the organization, and ensures that DigiPro goals and objectives are met.  After the CEO, the organization has various departments such as marketing, finance, and the I.T. department, ensuring that the organization’s daily activities are achieved.

 

 

 

 

 

 

DigiPro Network Architecture

DigiPro utilizes both public and private networks to handle its data and client information. However,  their private network is strictly accessed by authorized persons, which serves as a database for the public system (Abouelmehdi et al., 2017). The open web is designed to prevent I.P. traffics as it only allows the incoming of the authorized data. All these data are being used in a well-designated workstation following a well-designed network protocol. The network architecture is subdivided into various vital components, namely: network security, network bandwidth or the traffic network, router installation format, and firewalls.

Router:

It is an intermediary device that links the public and private networks, thus protecting the network environment (Zhang, 2018). The router provides ample working space for in determining the cause and solution in the upcoming disasters, which are realized in website platforms.

 

Firewalls

Firewalls play a vital role in boosting and strengthening security and management changes as follows; Systemizes the security of firewalls together with its devices, which customizes above the standard limits (Guan et al., 2018). The customization is significant in detecting problems as it has a high degree of accuracy. Firewalls give proves analysis of various conformations to safety rules that limits the organization’s performance towards the prevention of risks. It determines a series of guideline changes to maintain website operations continuously without hindrance. Additionally, it analyzes network to current changes, validating their ACLs into simple formats as well as managing the rate of risk to occur (Guan et al., 2018).

Virtual Personal Network

A virtual personal network is the most secure and safest network package as it tries to perform private duties toward risk management. Once one uses the VPN, the data encoded provide optimum security against internet fraudster (Kim et al., 2004). The virtual personal network has the upper hand in accessing clogged web platforms as it allows for filtration service on the internet.

The server

The server comprises of search engine tools which require a continuous update with current information covers and software items (Guan et al., 2018). The use of a wireless network is also essential to the Digipro Company as different customers or clients may want to access different platforms in which the wireless system provides a remedy to the network traffic. A wireless contact socket retreat quantities must include altering the automatic SSID password, disabling DHCP, using WEP, and modify SNMP settings (Kim et al., 2004).

DigiPro DRP policy

DigiPro DRP policy entails a system of protocols that ensure that threat to data security is mitigated from all angles. The organization has firewalls in its entire network which warn the I.T. experts of any ongoing data breach or unauthorized access to the system. The computer department then follows up on the I.P. address of the hacker and blocks or limits their access to the network.

Disaster declaration

In case the data breach cannot be traced and cannot be detected by the firewall, then DigiPro declares a disaster. A disaster declaration is a formal note or memo made by the committee or the response team, and the disaster management plan and team disaster declaration should not be comprehensive. Each department in an organization will give the statement only concerning the area affected by the disaster. Since the departments take different approaches to emergencies, the organization will adopt different methods, and the senior-most staff member will make the declaration of the organization. DigiPro, through the I.T. department, then tries to secure their network and systems while striving to locate where the breach began. A complete analysis of DigiPro files and databases occurs during a disaster declaration to assess the amount of damage that has happened and the amount of data lost due to the breach.

Assessment of security

Risk assessment and security is essential in an organization; this is because the data in an organizational structure is critical. For security assessment, the organization should be able to analyses the risks and the cautious approach to come up with the solution; the study gives it a correct picture and differentiating the hazards and different methods of tackling the technological hazards from cybersecurity.  In the case of DigiPro, a security assessment is vital. Security breaches are costly; by installing security assessment systems, DigiPro will quickly identify the risky behavior and acts towards the couth unruly cyber attacks. DigiPro security assessment takes place during login, where the network and the system determine whether the person accessing the network is authorized. Security assessment also takes place upon the arrival of all employees, ensuring that only employees working for DigiPro have access to the system and work environment.

Potential disaster scenarios

A scenario helps the disaster management team to plan and prepare for the risk in an organization. It is also used to consider the possible outcome of the risk. The result projected is a close send of the risk in a given situation. A worst-case scenario is a typical case in risk management planning, although it has been the best it has experienced a lot of critics

Generally, scenes are chaotic places for the wave of teams in a chaotic situation, the determinants of a disaster are the first hours of its prevalence, and this makes the standard capabilities bin it is prevalent be determined. DigiPro potential disaster scenarios include;

 

Disaster recovery procedure

DigiPro disaster recovery procedure will be to ensure that its client’s crucial information is safeguarded. The first step to disaster recovery will be to try to access the amount of damage or data loss resulting from the disaster. This is then followed by determining the root cause of the data breach and ensuring that the weak link is patched to prevent future tragedies. Then The I.T. department limits all access to the networks and systems while analyzing the entire system to determine the amount of data that has been leaked. The company’s’ clients are notified and issued with new passwords to access the system.

Inventory of hardware/software

There are crucial hardware’s and software’s that Digipro uses to limit the threats to data security. Using dedicated computers ensures that people don’t share computers all the time, increasing the risk of data loss or unauthorized entry into the network or system. The fibers are also fitted with firewalls and anti-viruses to limit data loss. The company also has data houses where Digipro data and information is stored to ensure that no external access to the data is possible.

 

Incidence Response Team (IRT)

Executive summary

This Charter outlines the possibility, objectives, power, relationship, roles, and accountabilities for the Computer Security Incident Response Team (CSIRT). The primary mission of IRT is the response to the scenarios about security investigation. It is also entitled to keep the training of CSIRP members on emerging scientific skills, keep continuous communication to correct groups, develop and maintain ample working space with their competitors, and keep required hardware and software tools for efficient research.

Mission Statement

Providing the safest network for transferring and storing data for our clients and business partners

Incident declaration

In case the data breach cannot be traced and cannot be detected by the firewall, then DigiPro declares an incident. DigiPro incident declaration takes place through the I.T. department, which then tries to secure its network and systems while striving to locate where the breach began. A complete analysis of DigiPro files and databases occurs during a disaster declaration to assess the amount of damage that has happened and the amount of data lost due to the breach.

Organizational structure

 

Information flow and methods of communication

 

 

 

Roles and Responsibilities

The chief information security officer is the leader of CIRT as the team leader and serves the following responsibilities; monitoring the doubtful events that need to be investigated, analyses events, and provides solutions on post-incident occasions.

Human Resources

  • Human resources are accountable for handling the pieces of an occurrence as it upsets the group’s employees
  • Uphold active and recurrent communications with workers to the level applied about the cyber incident

Authority

The CIO is the CSIRT guarantor and permitted to leadership roles. He/she has the audacity oversee and recommends an incident mitigation domain. The CSIRT will implement its responsibilities within the space of this Charter, as well-versed by any valid regulations, principles, directives, and any additional assignments of duty from external governance bodies.

 

 

 

 

 

 

 

 

 

 

 

References

 

Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., & Saadi, M. (2017). Big data security and privacy in healthcare: A Review. Procedia Computer Science, 113, 73-80.

Bertino, E. (2016, March). Data Security and Privacy in the IoT. In EDBT (Vol. 2016, pp. 1-3).

Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data security and privacy in fog computing. IEEE Network, 32(5), 106-111.

Kim J., Lee K., Lee C.,” Design and Implementation of Integrated Security Engine for Secure Networking,” In Proceedings International Conference on Advanced Communication Technology, 2004

Zhang, D. (2018, October). Big data security and privacy protection. In the 8th International Conference on Management and Computer Science (ICMCS 2018). Atlantis Press.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask