Chief Security Officer: As the Chief Security Essay

Total Length: 2148 words ( 7 double-spaced pages)

Total Sources: 5

Page 1 of 7

Chief Security Officer:

As the Chief Security Officer for a local University, my main role is establishing and maintaining an enterprise wide information security program that helps to ensure all data and information assets are not compromised. This process involves developing a plan to conduct a security program that prevent computer crimes, establishes a procedure for investigation, and outlines laws that are applicable for potential offenders. To develop an effective plan, the process would involve identifying recent computer attacks or other offenses that have been carried out against higher educational institutions and processes established by these institutions to prevent the recurrence of the crimes. In addition, procedures, methodologies, and technologies that could be bought to lessen computer crime threats and effective laws for convicting offenders will also be examined. The other parts of the process include identifying computer crime fighting government programs and the types and costs of computer forensics technology that can be used by the University.

Recent Computer Hacker Attacks or Other Crimes:

The United States is generally a society of openness and freedom, which are central values of higher education institutions. As a result of these values, competitors and foreign adversaries have been taking advantage of these institutions of higher learning. Actually, these adversaries and competitors have taken advantage of the openness in higher education to carry several abuses. This misuse include recruiting individuals for espionage, stealing technical information or products, spreading false information for various reasons, avoiding costly research and development, and exploiting the student visa program for illegal purposes ("Higher Education and National Security," 2011). Consequently, higher learning institutions have become increasingly vulnerable to different types of computer crimes.

In the past few years, higher educational institutions have experienced some computer crimes including hacker attacks. On the week of August 23, 2010, the University of Virginia fell victim to a cyber-attack that contributed to the theft of approximately $1 million. The attackers used malware to illegally obtain online banking credentials for accounts belonging to the college and transferred nearly $1 million abroad. At the beginning of this year, Miami University in Oxford, Ohio, experienced a hacker attack into its system by two students who were eventually charged with hacking the school's system to inflate grades. The other example of a recent hacker attack crime in a higher learning institution occurred this year at Ferris State University, which became a victim to hackers and contributed to numerous risks on the identifying information of thousands of students.

These examples demonstrate that administrators at higher educational institutions are as vulnerable to data breaches as business enterprises. This vulnerability is fueled by the fact that these institutions have several factors that make security more complex as compared to the commercial world. Secondly, these institutions have not had similar level of regulatory compliance pressure as other organizations in the commercial sector (Prince, 2010). Third, these institutions are affected by cultural factors because of their focus on strengthening an open educational environment rather than the need to protect sensitive information.

Processes Established by Institutions to Prevent the Recurrence of the Crimes:

Since these incidents of computer crimes on higher educational institutions have become common, especially hacker attacks, colleges and universities have established various processes to prevent the recurrence of the crimes or attacks. One of the strategies adopted by these institutions is shutting down the server and hiring a computer forensic company to investigate the system and prevent further unauthorized access ("Data Security Breach," 2013). Secondly, some institutions have hired a Chief Security/Privacy Officer to provide direction and guidance on how they gather, maintain, and distribute private information. Third, some institutions consult competent and skilled legal counsel in light of the state and federal regulations associated with data requirements.

However, these initiatives and processes have proven futile because of the constant increase of the number of such incidents. Actually, it's assumed that the number of data security breaches in higher learning will decrease if higher educational institutions get it right. For instance, hiring computer forensic companies to investigate a computer crime have been unsuccessful in some cases because of failure to demonstrate any unauthorized access. While these strategies are not entirely ineffective, it seems that these institutions strengthen their security measures to prevent recurrence of the offenses. In essence, the institutions should not only focus on reacting to computer crimes but addressing factors that contribute to the occurrence of these offenses in the first place.

Technology that can be Purchased to Lower Computer Crimes:

In essence, lessening computer crime threats is increasingly important to higher educational institutions that are vulnerable to such attacks and their effects.
The achievement of this goal requires establishing effective processes and methodologies that enhance security or purchasing technology to lower computer crime threats. There are various technologies that can be purchased for this process including next generation firewall, enterprise forensics solution, intrusion detection system, malware sandbox system, centralized/enterprise antivirus solution, and data aggregation, parsing, and correlation tools.

One of the technologies that can be purchased to lessen computer crime threats is EnCase Enterprise, which is an enterprise forensics solution. This technology is one of the most widely recognized law-enforcement utility for computer forensics. The concept of this forensic solution is the evidence file that consists of the header, the checksum, and the data blocks. They work together to offer a secure and self-checking description of the status of the computer disk during analysis (Easttom & Taylor, 2011, p.254). The other enterprise forensic solution that can be purchased to lessen computer crime threats is Access Data Enterprise. As a technology developed on industry-standard and court-accepted Forensic Toolkit, the technology provides a state-of-the-art incident reaction and deep dive evaluation of volatile and static data. The main advantage of this technology in helping lessen computer crime threats is that it provides an instinctive incident reaction console, secure batch remediation, thorough logging and reporting, and incomparable searching and filtering.

Access Data is currently offering Access Data Enterprise for a promotional offer of $12,500. The functionality of this technology does not require scripting while its users are not limited to proprietary technology. It contains an Internet-based management server that imposes granular role-based cyber security. Furthermore, Access Data Enterprise does not require the user to uninstall and reinstall during upgrade of functionality. The users can also handle metadata storage, huge data sets, robust data manipulation abilities, and delivering case management.

The other recommendations include Palo Alto Networks, which are next generation firewall and WildFire, which is a malware sandbox system. Palo Alto Networks provides a complete series of purpose-built hardware platforms including PA-200 that is designed for enterprise remote offices and PA-5060 for high-speed datacenters. These firewall platforms can help to lower computer crime threats because they are based on single-pass software engines. They also utilize function-specific processing for various functions such as threat prevention, networking, management and security to provide predictable performance. The cost of these firewall platforms depends on the specific type of network required by the organization. On the contrary, WildFire is a technology that utilizes sandbox analysis to identify and prevent unknown threats. This is primarily because attacks on networks are increasingly fueled by sophisticated malware developed to avoid the conventional antivirus controls. This technology expands the abilities of next-generation firewalls to detect and block unknown and targeted malware through actively evaluating it in a secure, cloud-based virtual environment. Some of the major system requirements for WildFire technology include dual 6-core Intel processor with hyper-threading, 120GB SSD hard disk, 128GB RAM, and 2TB RAID1 storage ("Wildfire," 2013).

In addition to purchasing technology to lower computer crime threats, higher educational institutions should hire chief security officer to direct and guide the handling of sensitive information in the computer system. Secondly, the institutions should develop their policies on handling computer systems based on the state and federal laws regarding collecting, maintaining, and distribute information. Third, these institutions should develop comprehensive and effective programs that promote information protection. The development of such programs requires an understanding of the various kinds of available safeguards, drivers, and ingredients.

Maryland Laws on Computer Cyber-crimes:

Given the increase of the threat of cyber-crime, Maryland's governor unveiled an aggressive policy for dealing with these offenses and establishing the state as America's epicenter for cyber security. The State has enacted various laws that provide the basis for governmental programs that address the threat of computer cyber-crimes. Some of these regulations to help combat cyber crime in the region include statutes on code grabbing devices and those that prohibit unauthorized access to computer and related material.

In recognition of the significant negative effects of these crimes and the need to fight them, the aggressive policy incorporated various aspects, initiatives, and programs to address these offenses. One of these programs to fight cyber-crime was recommendations for the formation of a National Center of Excellence for Cyber Security in Maryland ("Governor Martin O'Malley," 2013). This initiative would involve partnerships between federal and State government and the private sector and learning institutions. The initiative would play a major role in my….....

Need Help Writing Your Essay?