Key components of any information security program

Assignment Help Basic Computer Science
Reference no: EM132403508

Discussion 1

Auditing and Monitoring

Auditing and monitoring are key components of any information security program. One of the most helpful solutions that organizations use in this space is SIEM (security information and event management) systems. An article referencing SIEM can be found in this unit's study.

Explain in your own words the benefits of a SIEM system and how you believe these products can assist in the overall compliance of organizations.

Assignment 1

Performing Packet Capture and Traffic Analysis

Part 1 - Compare and contrast the uses of Net Witness Investigator and Wireshark. Include a discussion of the value of the data collected for each.

Part 2 - Security Planning: Monitoring and Access Request Approvals Presentation

Write the following using information found in the Course Security Scenario as context.

1. Monitoring (1 page).

2. Access Request Approvals (1-2 pages).

Part 3 - Create a 10-15-minute presentation (using a common presentation software of your choice) that describes Monitoring and Access Request Approvals policies that you would recommend to stakeholders interested in organizational security for the company described in the Course Security Scenario.

Your presentation must include audio narration with supporting visual depictions.

Consider the following scoring guide criteria as you complete your assignment:

- Create a monitoring policy that is appropriate for the Course Security Scenario.

- Create an access request approvals policy that is appropriate for the Course Security Scenario.

- Compare and contrast the uses of Net Witness Investigator and Wires hark and the value of the data collected.

- Create a presentation that accurately communicates a security plan to stakeholders.

Attachment:- Presentation.rar

Reference no: EM132403508

Questions Cloud

Explain the term usage of trade : Explain the term usage of trade. What happens if there is a conflict between the express terms of the contract and trade usage?
What are planning and control systems : What are planning and control systems?
Write description of the purported mechanism of action : Many clients may disagree with taking medications for fear of side effects, becoming "dependent" on the medication, having to take the medication for the rest.
Parties because of the loan provision : Barbara then claimed that the contract was not binding because the contract did not impose an obligation on both parties because of the loan provision
Key components of any information security program : Auditing and monitoring are key components of any information security program. One of the most helpful solutions that organizations use in this space is SIEM
Discuss whether or not candi made an offer to larry : Discuss whether or not Candi made an offer to Larry to design the holiday gown.Can Candie by sued by Larry?
People waiting for the bus : You are driving along in your car on a wild, stormy night, when you pass by a bus stop, and you see three people waiting for the bus:
Discuss case-specific cultural factors : You are required to discuss case-specific cultural factors as well as legal and ethical issues present in each case. Your responses must be 2 pages in length.
Will she be successful in her loan application : She seeks your advice. Will she be successful in her loan application? Give reasons for your answer.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the largest number of crates

The front wheels are free to roll. Assume that the engine of the loader is powerful enough to generate a torque that will cause the rear wheels to slip.

  Write a function template to find the average of two values

Write a driver program that uses the function template in Exercise 1

  The process of creating the contingency plan

Explain why it is important to include end-users in the process of creating the contingency plan? What information was targeted?

  Personal key performance indicators-critical success factors

Using Porter's Five Forces Model, personal Critical Success Factors (CSFs) and/ personal Key Performance Indicators (KPIs),

  Discuss why you think that principle is important

Choose a security principle and discuss why you think that principle is important to securing your network.

  Hired the security manager

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire,

  Discuss the issue of securing backups

Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information

  What if there is no hcl available

What if there is no HCL available? Where might one find any supporting data before beginning a particular installation?

  Explain network neutrality

Explain network neutrality. Try to explain this term in plain English, don't include any opinions of your own.

  Determine the final volume of the balloon

Determine the final volume of the balloon and work produced by the air inside the balloon as it expands the balloon skin.

  Explain the design approach and rationale

Explain the design approach and rationale

  Company records of minor work-related accidents

The safety director of large steel mill took samples at random from company records of minor work-related accidents and classified them according to the time

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd