Describe the characteristics of successful policy

Assignment Help Basic Computer Science
Reference no: EM132362725

PART ONE

Location of suspicious network traffic, knowledge of networks that generate troublesome traffic, and identification of network problems are some of the reasons why a cybersecurity professional would investigate network traffic. However, a major reason is to detect which traffic might be the cause of a cybercrime.

For this task, imagine that the program director of the cybersecurity unit in a local college has requested that you give a presentation on tools used to extract network packets for an investigation of a cybercrime on the finances of the college. It may help to select a specific college with which you are familiar.

In your presentation, you should address the following

Provide an introduction explaining the relevance of capturing network traffic for investigation purposes.

Provide a summary by stating the best tool(s) that you believe should be used in network traffic analysis for the cybercrime on the local college finances.

Delineate a course of action and determine the benefits that will be gained from implementing the recommended tools.

Include a Word document with the table below filled in, which you will provide as a handout to your audience.

Network Analysis ToolOperating systemBrief explanation of useTcpdump Windump Netintercept Wireshark Commview BillSniff MaaTec Network Analyzer EtherDetect packet Sniffer etherApe ntop NetSetMan

References: Support your presentation with at least 4 scholarly or industry references

Keep your audience in mind. Remember you are not preparing this for an academic audience. Your audience will not care about theoretical or conceptual issues in information security and healthcare in particular. They will only care about specific issues, strategies, and scenarios that are relevant to their organization.

Length: 5-7 slides (with a separate reference slide)

Notes Length: 200-350 words for each slide (in lieu of speaker notes, you may record a video or screen capture of yourself delivering the presentation, upload it to a video-sharing site such as YouTube, and submit the presentation along with a link to where the video can be viewed).

Be sure to include citations for quotations and paraphrases with references in APA format and style where appropriate. Save the file as PPT with the correct course code information.

PART TWO

Information Security Policies, Procedures, and Cybersecurity

Risk management helps in the identification of vulnerabilities and threats to information resources used by an organization. The process of risk management helps organizations in deciding what countermeasures, if any, to take in reducing risk to an acceptable level based on the value of the resource. The implementation of policies, standards, procedures, guidelines, and controls help organizations achieve a better security posture. In most organizations, information security policies are a primary element of cybersecurity and governance.

Information security policies and procedures reflect management standards. Guidelines help people conform to the required standards but are not mandatory. Guidelines use softer language than standards and are customized for the intended audience. As a cybersecurity professional, it is important to have an in-depth knowledge of the security policy of an organization to help with compliance and legal issues inside and outside the organization.

For this task, you will address information security policies, standards, procedures, guidelines, and controls. Address the following in your paper:

Differentiate between policy, standard, procedure, guideline, and control.

Describe the characteristics of a successful policy.

Outline in a diagram format the security policy lifecycle.

Outline the components of an information security policy.

Using the table below, define and explain the five most relevance policy that a cybersecurity professional should implement to help promote the security posture of the organization.

Outline the policy impact assessment to a production environment that deals with protected information.

Policy nameDescription/PurposeScope

Length: 1 page table, and a 5-6 page paper, not including titles and reference pages.

References: a minimum of 8 resources

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

Reference no: EM132362725

Questions Cloud

What are the current trends in mobile technology : This is really a Mobile Technology question. What are the current trends in mobile technology?
Users in the marketing department : How BI could use data from an ERP system and how results of BI could be presented to end users in the Marketing department.?
Why is it an important business tool : What is business intelligence and why is it an important business tool? Give and explain 5 reasons?
Briefly explain how and why an erp system : Briefly explain how and why an ERP system improves efficiencies and productivity in a company that previously did not have an ERP system.
Describe the characteristics of successful policy : Differentiate between policy, standard, procedure, guideline, and control. Describe the characteristics of a successful policy.
It security manager working with the database administrator : What do you consider to be the most important policies to adopt in order to secure your company's data? Explain your choices.
Input-processing-output system : With this in mind, identify the inputs, processing and outputs of the Mobile Pocket Office?
Define the creational and structural design patterns : Designers on a software project must have a well thought out and well-executed design; therefore, many choose a structured methodology to approach their system.
Appropriate non-functional requirements for the system : Identify and describe appropriate non-functional requirements for the system.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd