Reference no: EM133776470
Homework: Evaluation of Network Protection Technologies
Overview
Sound guidance in selecting technologies that ensure compliance with organizational security requirements is a key contribution that a cybersecurity practitioner provides to their organization. The ability to balance technical effectiveness against business considerations such as cost, implementation time, and the impacts on staffing, end-users, and infrastructure is a key skill.
For this project (due in Module Seven), you will be writing an evaluation of network protection technologies to your manager. This evaluation requires you to assess multiple technology options by weighing criteria associated with cost and effectiveness and then recommending a solution that satisfies the given requirements. In addition, your recommendation should be guided by a fundamental security design principle you select as a basis for your recommendation.
In this homework, you will demonstrate your mastery of the following course competency:
Describe the fundamental principles and practices of intrusion detection and prevention
Scenario
Your instructor has provided you with the specific scenario for this project as part of the Project Three Milestone. The scenario provided you with the beginning of a security plan that documents areas of relevance to your evaluation that you need for decision making in your project
Additionally, a fellow analyst has completed an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. Your manager has reviewed the evaluation, based on effectiveness and cost, and has verified its accuracy.
Based on your analysis of the technology evaluation and the details provided in the scenario, recommend a network protection system for implementation.
Prompt
You must address the critical elements listed below.
Explain how you are employing one of the Fundamental Security Design Principles to inform your recommendation.
Justify a recommended network protection approach. Describe how you balanced effectiveness, cost, and technical capabilities to select the network protection technology
Recommend resources (e.g., organizational assets, workforce allocation, policies/procedures, hardware) that are necessary for implementing or monitoring your chosen network protection approach. These resources should optimize the technology or maximize organizational resources. Explain your recommendation using an adversarial mindset or systems thinking approach.