As a junior at Indiana University in Bloomington working on obtaining an undergraduate degree in Informatics with a Cognate in Security, I felt honored to have the privilege of becoming an intern at Old National Bank located in Evansville Indiana this past summer. I was placed in the Cybersecurity Operations Division. My direct supervisor was Jon Nicholson, Cybersecurity Operations Manager who supervised the Identity and Access Management Team, as well as, the Security Operations Center for 188 branches of Old National Bank. I was given the titles of both Security Operations Center Analyst, and Network Operations Center Analyst. I became familiar with the Old National Bank’s cyberinfrastructure, and then adapted their Security Information and …show more content…
In addition to my direct supervisor, there were six other team members. Three team members were Network Security Engineers. One focused on Email and Web Security, as well as, Firewall Management. The second one focused on Load Balancing, the Virtual Private Network, in addition to, Firewall Management. The third team member also focused on Email and Web Security, as well as, Firewall Management. The forth team member was a Network Security Analyst who focused on Wireless Security Vulnerability Screening, and Certificate Management. The fifth team member was a Patch Specialist who focused on Workstation and Server Patching, and also Vulnerability Scanning. The final member of the team was a Disaster Recovery Specialist who managed the Disaster Recovery Program. This team based structure provided an excellent approach to maintaining a high level of security for the …show more content…
Particularly relevant to my internship, through the Info-I 101 Introduction to Informatics course, were the general topics of Structured Query Language (SQL), and the Computer Binary Number System which I used daily. In my INFO-I 130 Introduction to Cybersecurity course, I was introduced to the organizational aspects of security which helped me identify the security team structure at Old National Bank, and the technical security tools. The INFO-I 201 Mathematical Foundations of Informatics, and INFO-I 231 Introduction to the Mathematics of Cybersecurity courses helped me not only develop critical thinking techniques and propositional logic, but also formulas that I could apply to create alarm rules based on SQL. The INFO-I 202 Social Informatics, and INFO-I 303 Organizational Informatics courses taught social engineering methods, and organizational characteristics that were similar to the CBT Nuggets training course on Security+ that I took through Old National Bank which applied to a business specific environment. Regarding the courses on INFO-I 210, and INFO-I 211 Information Infrastructure I and II, Old National Bank used a variety of software architectures of information systems. As the SOC Analyst intern, the system that I became familiar was the LogRhythm Security Information and Event Management, or SIEM, tool that correlated logs, and events from multiple sources, and then
My team consists of four other people besides myself, Lauren Chojnaki, Alexa-Louise Patnode, and Jacobe Loewen, and Ryan Tyriver. Together, we are tasked with the mission to complete a stakeholder analysis regarding a specific organization and their structure. For this project to be completed successfully, it is important that all team members are able to cooperate with one another and are able to use their different strengths to create the best end product.
The Team members: They are responsible for the execution of the tasks at hand, they are also responsible for the tracking and reporting on programs to provide transparency and support decisions to adjust team structures and technical directions.
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
With the increasing use of emerging technologies and the associated information security threat threshold, Ohio University has adopted the NIST 800-53 security control framework to support their regulatory compliance efforts. NIST 800-53 is being implemented to provide a comprehensive set of security controls. This control framework is responsible for instituting minimum requirements that meet approved standards and guidelines for information security systems. It provides a baseline for managing issues relating to mobile and cloud computing, insider threats, trustworthiness and resilience of their information systems. NIST defines the standards and guidelines to be adhered to meet the cyber security control that align to FISMA expectations.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
What Type of Projects Would Benefit from a Dedicated Team: Its Pros and Cons Depending on the client’s requirements, it is possible to highlight a necessary type of the team that is suitable for the project. Dedicated Team Model is one of the most spread business models for IT projects. This means that the company can hire a team for its significant project on long-term period. However, this type of business model is not suitable for every project, so in this article, we are going to highlight what type of projects would benefit from a dedicated team.
1. Teamwork – Our international tax team comprise of several experienced professionals. At one hand, we have Professionals who are just starting their international tax compliance career, and there are several team members who have more than 4-5 years of international tax experience. Working with this variety of team members provides the great opportunity to learn new things, also provides an opportunity to see from a different perspective.
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
After a review of my performance in the assigned group, I have learned a great deal about myself and behavior in the team-setting situation. This is not the first experience in a team-setting. Previous team setting experiences were conducted in sporting and recreational environments rather than academics. While the setting and the environments were indeed different, there were many commonalities and correlations between the team settings I previously experiences and the current academic team-setting experience for this academic course project.
1. Discuss your experience participating in, or leading, a task group. If you have not participated in any task group, discuss any type of group participation. During the fall semester of 2016, I started my internship and ever since then, I have been attending weekly meeting.
I was given a team essay with a prompt that ask to analyze a conversation on diversity management, multiple points of views are to be analyzed thought out the team to form an ultimate conclusion. This essay is purely opinion based which mean no research must be conducted. Although this essay no research it is still important to draw an accurate opinion that can be presented effectively. To start, the instructor has given the essay prompt a month in advance to be worked with your team outside of class during that month. The first week, team members form their own opinion of diversity management and answer the questions accordingly, then during the second week the team forms together and we share are opinions and begin typing the
Reflecting on my topic of collaboration: networking and mentoring, I can see many ways in which it could enhance my teaching/administrating in a variety of ways. Researching this topic and connecting it to the course readings has validated the importance of collaboration of teachers and stakeholders in the education community. This collaboration can take many forms and can be done in a variety of settings, but the importance of such an action has a measurable effect on students. As an administrator, I can work to provide my teachers meaningful time to collaborate.
INTRODUCTION: Throughout the semester I volunteered at two different University of Miami Men’s tennis matches at the Neil Schiff Tennis Center. I volunteered for three hours on February 2, 2018 when University of Miami hosted Georgia Southern for their home opener. The second event I volunteered for a total of five hours on February 11, 2018. On this date, UM played against two different opponents.
Working in teams provides an opportunity for individuals to come together and establish a rapport towards others within a group. Teamwork is classified as people with different strengths and skills who work together to achieve a common goal. When a team works well, specific objectives are fulfilled and satisfied. Teamwork plays a crucial role in implementing and fulfilling a common goal in a team project. Each member plays a role and takes on different responsibilities combined together. In different stages of teamwork, conflicts and arguments may occur for as members have different standpoints which need to be harmonized within the team. The key to having an effective teamwork is to explore each member's unique abilities to motivate them.
Group A - Education and the developing world My perspective on education and development has broadened based on the information presented. Global inequalities are present in numerous undeveloped countries and have a negative impact on its citizens. Citizens are faced with numerous challenges on a daily basis. For instance, their essential needs are not being met and are at risk of contracting infectious diseases.