The Repository @ St. Cloud State

Open Access Knowledge and Scholarship

Date of Award

12-2017

Culminating Project Type

Starred Paper

Degree Name

Information Assurance: M.S.

Department

Information Assurance and Information Systems

College

Herberger School of Business

First Advisor

Susantha Herath

Second Advisor

Jim Q. Chen

Third Advisor

Ezzat Kirmani

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Abstract

The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in organizations. Software companies and application vendors are unable to keep up with rapidly growing attacks and changing threat patters. The need for information security should be apparent and require substantial research, knowledge, and ability to design and implement an effective security program. Also, requires a great investment of time and resources. Many small and medium businesses may understand the importance of risk, but lack in grasping the severity of the problem and resources to identify it. A well analyzed and implemented information security program can reduce the damage caused by an attack by reducing the mean time to detect, contain and restore. The purpose of this paper is to present a systematic approach to conduct analysis by gathering data, implementing and monitoring the critical security controls. An effective information security process ensuring strong security posture to defend against cyber-attacks with minimum resources and open source software is the key to this research as it reduces the cost to implement and maintain the security operations center. The literature focuses on increasing cyber-attacks on organizations and how to prevent these attacks using technical countermeasures and non-technological side of information security. This research refers to CIS critical security controls (CSC) to classify data, systems and analyze risk using Qualitative and Quantitative data. Research data is collected from J & B Group Information technology team. Importance of security program is not only adopting best security processes and tools but also must be reviewed, updated and maintained on a regular basis. Continuous monitoring of security controls is driven with open source SIEM tool with minimum license and by establishing custom rules for generating offenses and alerts.

Comments/Acknowledgements

I would like to express my sincere gratitude to my supervisors as well as committee members Dr. Susantha Herath, Dr. Qingjun Jim Chen, and Dr. Ezzat Kirmani for providing their invaluable guidance, comments and suggestions throughout the course of the paper.

Share

COinS