sbuckle9_cybr7930_serviceplan
pdf
keyboard_arrow_up
School
Kennesaw State University *
*We aren’t endorsed by this school
Course
7930
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
8
Uploaded by BarristerElectron6962
MEMORANDUM
TO: Jake Bullium, Diamond Hands Holding Inc, CEO
FROM: Shanell Buckley, Security Analysts
SUBJECT: Diamond Hand Holdings INC. Security Services Directory
DATE: October 29, 2023
Good afternoon, Evan
Included in this memorandum is a security service plan for Diamond Hand Holdings Inc.
Throughout the memorandum, the security service directory will help and be a guide for all the
activities that DHII oversees and supports secure access and authorization too. This directory
will help provide a service and a source of reliable information to all current and future clients
on the budget rates and opportunities offered throughout working with a partnership with
DHII. All DHII employees will have a diverse amount of experience and knowledge about our
company's mission, policies, and procedures. In the completion of reviewing this memorandum
and illustration of our company's mission and goal to defend our budget against any cuts will be
precise and show the value we hold to standard at DHHI.
Best Regards,
Shanell Buckley
Security Analyst
SECURITY SERVICES DIRECTORY PLAN
_____________________________________________________________________________
Purpose
Using the information from the DHII case study this security service plan will implement
strategies to ensure that security is always a priority factor. With the data and information, we
have acquired throughout the case study we will implement a systemized directory on what
tasks are performed, revenue and cost along with performance reviews. All services provided
through partnerships with DHII will be listed below in the directory for anyone wanting to
obtain statistical information about investment returns and services provided. This security
service plan will benefit all staff members in various aspects that pertain to their responsibilities
of their roles within the company.
Plan
From the information gathered in the DHII case study we will use the Product and Services data
to help decide what services we can provide services for to secure the Asset Inventory. The data
obtained will then help maximize the needed information for rows in our table to construct the
planned directory. In the directory we will describe all assets, and how it will impact the value
throughout DHII and result in positive gains for our business operations. We will make certain
that all assets are validated and considered when reviewing risk compliance possibilities. We
will diligently work to ensure that DHHI remains profitable, reliable, and trustworthy with all
future business partnerships. We will review certain assets that would not typically be
considered, however will provide a substantial benefit increase for the current year.
By
providing this security service plan DHHI will be able to accurately identify all potential security
risk and deviate strategies to deconstruct them. We will diminish cost and budge when it comes
to our services provided to make reasonable estimated predictions, yet still meet all DHHI
budget guidelines and restrictions to determine the exact cost of services.
Information Collection
We will hold seminars and conduct interviews to share the company knowledge with experts to
gain constructive criticism of each service provided. This will make certain that comprehension
of each service provided is understood throughout the duration of the partnership with DHII.
We will coincide with developmental teams to gather information about resources, service
frequency, time durations and cost. The principles that we hold our company mission will
ensure that the security service directory is trustworthy and abides by best practices.
Plan Validation
To validate the security services plans with involved business partnerships, and the
implementation of the services will be reviewed under the direction of NIST SP 800-
53 “Guide
to Information Technology Services”.
Evaluations of the quality of implementation for required
services will also occur to ensure service goals are met. All the education will be completed
through meetings, interviews, emails, and presentations as well.
Services
Function
Receiver of
Service
Frequency
Cost
Justification
System
buildout
service
Offers clients
complete
developmenta
l access of the
systems that
are ready to
be used
the
organization
as needed
<>
The buildout
will help DHHI
services obtain
deliverables
for each
system to
complete in
timely effort.
This service
will bring out
an increase in
revenue.
Server backup
service
This will offer
a secure
location to
store client
data file
copies and
ensuring their
protection is
priority
the
organization
daily
.78 per Gig
Backup
services
ensure that
data is always
restored in the
unfortunate
disaster of
takeover or
having to
delete all
previous saved
data.
Network
Administration
this service
will help
evaluation of
network
infrastructures
and targets to
support and
manage
client's
networks
the
organization
daily
$110 per
workstation
after the
system
implementatio
n has been
completed
and will
ensure that
the network
remains
protected
while
undergoing
vigorous
monitoring.
virus detection
service
This service
will provide
preventative
measures to
eliminate any
attacks or
malicious
attempts that
will affect how
the system
operates.
the
organization
daily
$100 per
station
The service
will help
monitor the
network for
any potential
malicious
system attacks
and will notify
the proper
department
personnel
Information
security
planning
this service
includes
leverage
within current
and future
resources to
help diminish
the risk and
maximize
incoming cost
opportunities
the
organization
as needed
$250 per hour
This service
will allow the
organization
to actively
protect all
assets and
data from any
malicious
attacks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Penetration
testing Service
this service
will offer
security
assessment
Evalution to
discover any
potential
weakness
within the
company
security
network
the
organization
annually
$10K
this service
will help the
organization
identify where
we are lacking
security
measures to
protect DHHI
information
and data.
business
continuity
this service
will help
develop plans
that fit
specifically to
the client
without any
business
operation
disruption
occurring. This
service can be
identified as a
core business
need and
function to
evaluate any
potential risk
the
organization
annually
$10K
this service
will construct
a plan to keep
business
running even
in the
unfortunate
event of the
organization
being shut
down due to
system error
or malicious
attacks
HR
Information
System
Assist in the
Development
of
Governance,
Risk and
Compliance
this will
ensure that
we follow all
guidance and
risk and
compliance
strategies to
develop and
implement
strong policies
to keep
private
information
confidential
the
organization
annually
$25K
As an business
organization
operating in
virtual
cyberspace, it
is still subject
to all state and
federal laws to
abide by. this
service will
ensure that
we are always
within the
guidelines and
define our
mission policy
and standards
to follow
Technical
Support
Services
This service
will provide
24/7 support
to clients who
have opted in
for this select
option via
online or over
the Telepone
any consumer
of the DHHI
services and
DHHI
employees
daily
$125 per user
DHHI must
offer technical
support to all
clients and
employees
during
business
Consulting
Services
This service
will help
clients assess
and identify
various
strategies that
would best
benefit the
company
the
organization
upon request
$300 hourly
This service
does not
include any
implementatio
n and follows
closely
research and
consultation
services that
would benefit
in a positive
manner.
marketing
exchange
services
this service
will provide
services with
no charge in
exchange for
advertisement
of DHHI
DHHI
ongoing
throughout
the annual
calendar year
<>
This will serve
as an outreach
to generate an
increase in
DHHI sales for
the company.
It will also in
exchange
provide equal
benefits for
both DHHI the
organization
and business
partners as
well.
communicatio
n services
offers
integrated
communicatio
n to promote
equality and
collaboration
for networking
clients
the
organization
daily
$75 per user
The service
provided will
close the gaps
between any
provider and
client. Helps
operate with
positive
communicatio
n to ensure
business
operations run
accurately.
storage and
data services
This service
will offer the
opportunity
for various
storage
options
including but
not limited to
file and object
storage as
well.
the
organization
daily
<>
This service
will play a
large role in
access and
authorization
control to
manage all
stored data
and secure it
while
remaining
protected
from file
corruption or
system failure.
security and
privacy
services
This will help
clients ensure
that both
physical and
virtual data is
confidential
and remains
protected by
ensuring
integrity
within all data
access users
the
organization
daily
$3K-10K
dependent
upon the
package
selected
This service
will ensure
that the
organization is
equipped with
cybersecurity
and physical as
well whenever
any modern
technology
implementatio
ns are rolled
out. With
adequate
security tools
in place, it
diminishes the
opportunity
for
cybercriminals
to manipulate
access
authorization.
end service
users
this will help
clients
understand
the
productivity
within and
the
organization
daily
$125 per
authorized
user
This service
will help in
assistance
with
organization
employees to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
also business
collaborations
as well
operate
feature's of
the
applications so
that
productivity
remains
uninterrupted,
and all
employees are
well
knowledgeabl
e.
Security Service Plan Summary
To ensure we have a complete list of services provided
by DHII we used the “Product and
Services” section to begin the case study documents. The ser
vices offered to company
partnerships are based upon where the most revenue is received. The other sources that were
used to document the case study was the Asset Inventory located in Appendix B. Once I located
the services provided, I then further explored DHHI future goals and things they would like to
add in addition to the current service provider list. I then utilized the opportunity to review for
any services that might be in need for information security organization to ensure they are
providing the ultimate best services.
Comparison analysis of the services will show valid reasoning behind company decisions when
it comes to services provided as well. I would implement meetings with any future partnerships
to ensure that all needs were met, and no questions go unanswered. The required meetings will
help provide insight into possible beneficial opportunities for DHHI. Any business opportunities
would be reviewed by conducting interviews with clients to show their gratitude and
sometimes organize mini test trial runs to utilize success rates. If we were in business, we
would have undergone extensive detail to analyze cost benefit projection. Then the plan would
be reviewed by business partnerships for consultation and changes when needed to ensure
that we are providing services standard to the NIST Standards SP800-35.