Describe what audit data is and how it is used

Assignment Help Management Information Sys
Reference no: EM131258728

Intrusion Tools and Techniques

Your company wishes to ensure that if and when an intrusion happens they can detect it and determine the extent. You have been asked to write a white paper that describes the importance of collecting audit data and the importance of reviewing that data.

This first assignment will allow you to establish The Key Assignment Template that will be used throughout the class for all Individual Project submissions and to explore the framework securing an organization's data. You will:

• Create the template to be used for the submission of all Individual Project Assignments
• Describe what audit data is and how it is used.
• In the framework of the network and servers what devices should audit data be collected and where it should be stored.
• Describe a process or policy for how and when audit data should be reviewed.
• Also take this opportunity to discuss the security of audit data, meaning, just because data is collected and reviewed, does this mean it is secure and accurate.

The template document should follow this format:

• Vulnerability Assessment Project Document Shell
• Use Microsoft Word
• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents

o Use auto-generated TOC.
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o Intrusion Tools and Techniques
o Common Vulnerabilities and Exposures
o Attack Methods
o Intrusion Detection System Policies
o Protective Measures

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

• Intrusion Tools and Techniques (Week 1 - IP)

o Intrusion Detection
o Auditing
o Audit Data Review.

Reference no: EM131258728

Questions Cloud

Which item should be stored at the very front : Which item should be stored at the very front (closest to the dock)? - Which item should be stored at the very back (furthest from the dock)?
Calculate the equilib-rium constant at 25°c for the reaction : If there is no water vapor in the air, the oxygen partial pressure would have been 0.2. Assuming that nitrogen, oxygen, and water vapor are the only important contributors to the gas pressure, calculate the equilib-rium constant at 25°C for the re..
What were total maintenance costs when company experienced : Song, Inc., uses the high-low method to analyze cost behavior. The company observed that at 20,000 machine hours of activity, total maintenance costs averaged $34.30 per hour. On the basis of this information, the fixed cost was. On the basis of this..
How do media positively or negatively influence public image : The media, and Hollywood in particular, represent one avenue in which the general public becomes familiar with the role of nurses. How does the media positively or negatively influence the public's image of nursing? What other avenues may better ..
Describe what audit data is and how it is used : Describe what audit data is and how it is used. In the framework of the network and servers what devices should audit data be collected and where it should be stored. Describe a process or policy for how and when audit data should be reviewed.
What are the variable costs per unit : The variable costs per unit are $18 when a company produces 24,000 units of product. What are the variable costs per unit when 26,000 units are produced? The fixed costs per unit are $20 when a company produces 20,000 units of product. What are the f..
What training will need to be done prior to implementation : Now that you have identified the data sets, discussed the electronic health record (EHR) and computerized physician order entry (CPOE), and identified patient demographic information data elements that are necessary for the new system, you will be..
What are three basic approaches to negotiations : What is vertical integration? Give examples of backward and forward integration ? What are three basic approaches to negotiations?
Craft a security management plan for your organization : As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Situational approaches to leadership

SITUATIONAL APPROACHES TO LEADERSHIP

  How agencies become involved in the rule-making process

From the e-Activity, describe the rule-making process, how agencies become involved in the rule-making process, and how other people can become involved in the rule-making process.

  Describe the data breach incident and the primary causes

Describe the data breach incident and the primary causes of the data breach. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements

  Problem of statement of cash flows

Dingo boot company uses the direct method to prepare its statement of cash flows. the company had the following cash flows during 2014:

  Determine which cpu of the two is faster and why

From the first e-Activity, identify the following CPUs: 1) the CPU that resides on a computer that you own or a computer that you would consider purchasing, and 2) the CPU of one (1) other computer. Compare the instruction sets and clock rates of ..

  Discuss the concept and be supported with scholarly research

Discuss the concept and be supported with scholarly research. Provide a practical example for each of the  systems approach to quality accounting information systems concepts.

  Discuss the evolution of information systems

Discuss the evolution of information systems in an organization. How can the use of ERP systems remove information or functional silos in organizations?

  Architecture the new payroll application

Explain what type of architecture the new payroll application should use and why, Create a graphical representation of your recommended architecture

  A project to develop a full screen editor

A project to develop a full screen editor. The major components identified are-  screen editor, command language interpreter & file input output,

  Have you had prior experience in erp implementations

Have you had any prior experience in any ERP implementations? Share your experience. What was your role? What were the tasks involved? What was the final outcome? What would you do differently? What was the role of top management?

  Information technology and decision making

Information Technology and Decision Making- Patient safety and care is reliant upon the quality of nurses' daily decision making

  What is disaster recovery

What is disaster recovery

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd