{"id":293,"date":"2024-04-21T01:52:29","date_gmt":"2024-04-21T01:52:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/esty05\/?p=293"},"modified":"2025-10-30T01:05:48","modified_gmt":"2025-10-30T01:05:48","slug":"protection-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/esty05\/2024\/04\/21\/protection-availability\/","title":{"rendered":"Protection Availability"},"content":{"rendered":"<br \/><br \/>As CISO (Chief information security officer) working for a public organization, promoting security is the primary objective. Making the system available would be the top priority, as well as promoting the working metrics (McLaughlin, n.d.). Lack of system availability impacts revenue and customer trust, and this would make an organization operate at a loss. The SEC disclosure places the system under the threat of cybercrime, which would result in legal liabilities. The essay expounded on the role played by CISO in the promotion of system availability through resiliency, redundancy, and ready-to-operate in three critical fields.<br \/>\tThe first field that would be enacted is that of network architecture, and this would require introducing robust defenses in the perimeter, such as web application firewalls, IPS\/IDS monitors, next-gen firewalls, and advanced hazard identification metrics (McLaughlin, n.d.). It would aim to protect the internal and external operations of the organization from being exploited by attacks or system malfunction. There would be internal core systems that would mitigate the strict access granted to the access control. Other would-be disaster management sites, redundant web connectivity, clustered data, load-balanced servers, and offsite backups to promote the level of resilience. <br \/>\tThe other investment would be in incident response by regularly testing and writing all the incidents. It would entail IT experts, managed service providers, executives, and legal and PR professionals. Also, pre-contracting would be done with the DDoS, which would be imperative in promoting security. The team would create simulations that create scenarios and pressure on the system to evaluate its effectiveness and identification of the ropes in need of improvement. The third would be business continuity, which indicates the maximum tolerable downtime experienced by the organization&#8217;s employees. The plans would include the DR\/BCP to identify the critical functions using spare capacity, redundancy, and operational cost. Regular testing is vital to indicate effectiveness and determine the cause of the action.<br \/><br \/><br \/>Reference<br \/>McLaughlin, emily. (n.d.). What is a CISO (chief information security officer)? Definition from SearchSecurity. SearchSecurity. https:\/\/www.techtarget.com\/searchsecurity\/definition\/CISO-chief-information-security-officer<br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/>","protected":false},"excerpt":{"rendered":"<p>As CISO (Chief information security officer) working for a public organization, promoting security is the primary objective. Making the system available would be the top priority, as well as promoting the working metrics (McLaughlin, n.d.). Lack of system availability impacts revenue and customer trust, and this would make an organization operate at a loss. The [&hellip;]<\/p>\n","protected":false},"author":28250,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":7},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/users\/28250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":420,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/293\/revisions\/420"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}