Determine what type of log files to review

Assignment Help Management Information Sys
Reference no: EM131051379

Background:

Organizations of all sizes should be concerned with the security and confidentiality of their electronic data. Cyber crimes affect individuals and companies alike. However, companies typically have more financial and other assets that can be compromised by various cyber crimes. Establishing an organization-wide information security program is a great start to mitigate cyber-related crimes and attacks. This process typically commences with an honest evaluation of the organization's vulnerabilities and potential threats. For this assignment, you will read a scenario and develop a report as outlined below.

Scenario:

A contractor for the United States Department of Defense builds proprietary communication devices and peripherals, which allow soldiers in active combat to communicate with central command. These devices are used to transmit highly sensitive information regarding military deployments and battle plans. Once delivered, the devices interface with the U.S. military global communications network. In order to comply with the military's security requirements, the contractor must conduct a security risk analysis of their internal networks and information systems for intrusion detection and cybercrime prevention.

Please note that the contractor is performing a security risk assessment of its own network and system and not of the military network. After all, a breach of security on the contractor's computer systems could compromise confidential and sensitive military information. You have been asked to head up the project team that will ultimately perform this security assessment and analysis.

Report Sections

Overview

Provide a brief abstract in narrative form of the contents of this report

Investigation Plan

Describe what techniques you will use to begin the investigation

Identify who should be interviewed first

Determine what type of log files to review

Distinguish what methods should be used to preserve the integrity of the evidence

Identify at least 5 potential threats and explain your rationale and any assumptions you made.

Identify at least 5 vulnerabilities and explain your rational and any assumptions you made.

Identify at least 5 risks and explain your rational and any assumptions you made.

Out of all the potential risks that you have identified, select the three that could be have the largest impact. Justify your reasoning.
Conclusion

After conducting your investigation, describe three cyber security best practices that you would recommend

Reference Page

You may consider referring to these resources for guidance on federal legislation and standards:

https://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf
https://csrc.nist.gov/publications/PubsFIPS.html
https://csrc.nist.gov/publications/PubsSPs.html
6 Pages, 5 scholarly sources

Reference no: EM131051379

Questions Cloud

Identifying information about the children : Summary of your observations, including the age group, how the development theories were implemented, and how the children re: Do not include any identifying information about the children.
To invest it to meet two financial goals : Imagine you inherited $50,000 and you want to invest it to meet two financial goals: ( a) to save for your wedding, which you plan to have in two years, and ( b) to save for your retirement a few decades from now. How would you invest the money? ..
Program that uses a two-dimensional array : Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. The program should output the average high, average low, and highest and lowest temperatures of the year. Your program must ..
Yield to maturity and future price : Yield to maturity and future price A bond has a $1,000 par value, 15 years to maturity, and a 8% annual coupon and sells for $1,080. Assume that the yield to maturity remains constant for the next 5 years. What will the price be 5 years from today?
Determine what type of log files to review : Describe what techniques you will use to begin the investigation, Identify who should be interviewed first and Determine what type of log files to review
Describe possible deductions and the specific information : Describe the possible deductions and the specific information you may need to complete their taxes on these issues. Also, explain how these issues may affect their tax bracket.
Shares of stock will be outstanding after the split : Della's Pool Halls has 12,000 shares of stock outstanding with a par value of $1 per share and a market price of $39 a share. The firm just announced a 4-for-3 stock split. How many shares of stock will be outstanding after the split?
Prepare a multiple-step income statement for fiscal year : Prepare a multiple-step income statement for fiscal year 2011. Prepare a single-step income statement for fiscal year 2011.
Types of computers : Mention 4 types of computers as classified according to their sizes and give 2 characteristics of each.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Overview of project tasks and output of scheduling tool

Project risks will a subject that you analyse and consider as you draft these sections -  As you contribute to your group's Project Plan Outline, be mindful of Module Discussions and reflect on aspects of these discussions and how they can help you..

  How would harley-davidson''s business be affected

How would Harley-Davidson's business be affected if it decided to sell accessories directly to its online customers? Include a brief discussion of ethics involved with this decision

  New manufacturing software system

Your role is that of Sue Barkley. You will recommend a course of action to your brother, Kyle, in regards to the new manufacturing software system. The obvious choices are do nothing, accept the EMS proposal and start implementation, or take Don C..

  The challenge for management has transitioned from a simple

over the twentieth century the ability to process information in terms of labor units has improved by a factor in the

  Differentiate the software concepts of operating system

Differentiate between the software concepts of operating systems, application programs, utility programs, and programming languages

  Provide a physical design that will meet the specifications

System design will include visual presentations of each of the following: modeling for specifications, data design, and user interface design. Each of the diagrams will visually represent your design - Provide a physical design that will meet the s..

  What single factor will impact all business more than is

On the other hand, what single factor will impact all business more than IS? And, isn't knowl- edge and proficiency with IS and IT key to future employment and success?

  Explain centalization versus decentralization-i.s. function

Centalization versus decentralization: I.S. functions - This IS function typically either forms into a single corporate department with separate areas for individual IS functions or operates

  Source selection negotiations and contract managementbuyer

source selection negotiations and contract managementbuyer organizations seeking it services usually require an oral

  Determining the competitive value of information technology

Identify three factors to consider in determining the competitive value of information technology. Justify the selected factors. Of the factors selected, determine if each factor is applicable to all businesses and industries, and explain why or why ..

  Computer which of the following is designed for developing

computer which of the following is designed for developing web applications?which of the following is designed for

  Utilizing your comprehensive security plan outline

Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd