How to apply continuous monitoring technical reference model

Assignment Help Computer Engineering
Reference no: EM132232621

Question: CONTINUOUS MONITORING

The following example demonstrates how to apply continuous monitoring technical reference model to a particular risk management domain. Please read the following article and identify a few key lessons learned from it in relation to what principles and methods you have learned in the case assignment.

NIST (2011). Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains.

Practicing continuous monitoring fundamentals, processes, etc. to one's own experiences offers an opportunity to apply what you've learned to the real world. Can you choose a particular information system security domain of your organization or industry and apply what you learned from the case readings and SLP examples? You can choose to assess comprehensively, or you can choose not to cover all the aspects of continuous monitoring but focus on two or three major perspectives and go much more in depth. You can choose the same security domain in the previous SLP assignment in this course, or start with a new one.

SLP Assignment Expectations

Please write a 2- to 5-page paper titled:

"Continuous Monitoring for ______ (your chosen information system security domain in your chosen organization/industry): Challenges and Solutions"

Please address the following issues:

1. Special requirements of continuous monitoring in your chosen information system security domain in your chosen organization/industry if there are any.

2. Two or three major perspectives of continuous monitoring that you choose to go in depth to discuss.

3. One or two major lessons learned from the example that you'd like to apply in your own continuous monitoring issue here.

4. Key challenges and solutions of continuous monitoring.

Reference no: EM132232621

Questions Cloud

Calculation of piecework award for garment worker : Illustrates the calculation of a piecework award for a garment worker who has completed two hours of service.
Explain the advantages and limitations of each approach : Distinguish between peer-to-peer, client/server, and mainframe networks, and explain the advantages and limitations of each approach.
What is the probability she falls on the 8th hurdle : A second hurdler decides to keep running until she falls. She has a 15% chance of falling at each hurdle.
International organization for standardization : Explanation of International Organization for Standardization (ISO) and its relevance to global commerce.
How to apply continuous monitoring technical reference model : The following example demonstrates how to apply continuous monitoring technical reference model to a particular risk management domain.
Business firms invest heavily in information systems : According to Kenneth Laudon, business firms invest heavily in information systems in order to achieve the following six strategic objectives:
Discuss the major challenges in continuous monitoring : Let's evaluate some technologies that can help with continuous monitoring. One example is Cyberscope which is an automated reporting tool for security.
Management scientists have classified advertising : Management scientists have classified advertising using different criteria, what are they?
Claims to funds : Claims to Funds. Paul had a great job as a bank executive. Which of the following parties has first claim to proceeds from the house?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd