Threat Detection Systems – Case Study Example

Download full paperFile format: .doc, available for editing

The paper "Threat Detection Systems" is a good example of a case study on information technology. PROJECT GOAL Development of a security threat detection system for a company SMITH-BROOKS CORPORATION INTRODUCTION This is a company that specifically deals with the designing of an integrated circuit for multi communication systems across the world. Mick grey is the founder of the company back in 1990. Currently, the company is the leading producer of integrated circuits worldwide. Some of the distribution areas for the company’ s products are in the United States of America, Europe, and Asian countries.

In cooperation with some of the best logistics shipping companies, the company is able to effectively transport highly valuable integrated circuits to various customers worldwide with good timely delivery. The company headquarters are based in the United Kingdom where it’ s strategically placed to be able to be the key player in the east-west supply chain. The company’ s main mission is to be the key leader and best in its field of production. The purpose is to still become the big player in supplying electronic intergraded circuits to various countries in the world and also share the international trade benefits with the company’ s expertise.

The company’ s customers are including most of the supplying regions best placed financially status. Our company’ s operations are a true and clear indication of our world-class levels of standards in service and product delivery to the customers. The company has been on a high rise in terms of growth as it has established itself as one of the respected service and product delivery when it comes to its field of integrated circuit production. The ever upcoming challenges in the field have been a tool that has always promoted the further development of this company as more solutions are developed to solve these challenges.

(Drew 2005). Location and Facilities Smith-Brooks Company based in an industrial area with the area being dominated by other light industry manufactures. They include steel fabricators, boat builders, warehouses and also distributions centers. The sites consist of both the general and special buildings which are: Administration Office Production Facility Security Storage Facility The buildings in the drawing are the plan components in the facility as per the company’ s description; it also gives a summarized description of the company’ s physical layout.

Some of the various units of the site are the administration office, its production facility, secure warehouse facility. The company has a high tight secure fencing that resists physical entry by encroaching thieves. The production plant is made of the clean manufacturing unit, controlled production area, a testing area for the already made circuits and loading zone for the made products. (Drew 2005). The administration unit is made of management and the clerical offices, a central place for computer networked for the site.

The plant room is associated with an administrative unit for serving the area. The warehouse is within the compound of the facility. It’ s used to store high-level materials that require high-intensity protection as they are the main source of income for the company Staff The company is made of a total of 56 staff members and the organization structure is illustrated by the flow chart below

References

Automated and proactive threat detection offering. (2001). Computer Fraud & Security, 2001(10), 4. http://dx.doi.org/10.1016/s1361-3723(01)00010-0

Borrion, H., Tripathi, K., Chen, P., & Moon, S. (2014). Threat detection: a framework for security architects and designers of metropolitan rail systems. Urban, Planning And Transport Research, 2(1), 173-194. http://dx.doi.org/10.1080/21650020.2014.908739

Clark, C. (2008). Infosecurity 2008 threat analysis. Burlington, MA: Syngress Pub.

Clark, C. (2008). Infosecurity 2008 threat analysis. Burlington, MA: Syngress Pub.

Delahoz, Y. & Labrador, M. (2014). Survey on Fall Detection and Fall Prevention Using Wearable and External Sensors. Sensors, 14(10), 19806-19842. http://dx.doi.org/10.3390/s141019806

Drew, S. (2005). Reducing Enterprise Risk with Effective Threat Management. Information Systems Security, 13(6), 37-42. http://dx.doi.org/10.1201/1086/44954.13.6.20050101/86219.6

Gilliland, A. (2006). Understanding the IM Security Threat. Information Systems Security, 15(1), 16-20. http://dx.doi.org/10.1201/1086.1065898x/45926.15.1.20060301/92681.4

Gilliland, A. (2006). Understanding the IM Security Threat. Information Systems Security, 15(1), 16-20. http://dx.doi.org/10.1201/1086.1065898x/45926.15.1.20060301/92681.4

Goold, B. Development of the Organised Crime Threat Assessment (OCTA) and Internal Security Architecture. SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.2022332

Kim, Y. & Cha, S. (2011). Threat scenario-based security risk analysis using use case modeling in information systems. Security And Communication Networks, 5(3), 293-300. http://dx.doi.org/10.1002/sec.321

Lee, W., Wang, C., & Dagon, D. (2007). Botnet detection. New York: Springer.

M. Barrios, R. (2013). A Multi-Leveled Approach to Intrusion Detection and the Insider Threat. Journal Of Information Security, 04(01), 54-65. http://dx.doi.org/10.4236/jis.2013.41007

M. Barrios, R. (2013). A Multi-Leveled Approach to Intrusion Detection and the Insider Threat. Journal Of Information Security, 04(01), 54-65. http://dx.doi.org/10.4236/jis.2013.41007

Padayachee, K. (2016). An assessment of opportunity-reducing techniques in information security: An insider threat perspective. Decision Support Systems. http://dx.doi.org/10.1016/j.dss.2016.09.012

Ristic, I. (2005). Apache security. Sebastopol, CA: O'Reilly Media.

Steele, S. & Wargo, C. (2007). An Introduction to Insider Threat Management. Information Systems Security, 16(1), 23-33. http://dx.doi.org/10.1080/10658980601051334

Tally Systems update threat list. (2001). Computer Fraud & Security, 2001(7), 4. http://dx.doi.org/10.1016/s1361-3723(01)00711-4

Workman, M. (2007). Gaining Access with Social Engineering: An Empirical Study of the Threat. Information Systems Security, 16(6), 315-331. http://dx.doi.org/10.1080/10658980701788165

Ye, B. (2013). Benchmarking insider threat intrusion detection systems. Halifax, N.S.: Saint Mary's University.

Download full paperFile format: .doc, available for editing
Contact Us