Reference no: EM132403508
Discussion 1
Auditing and Monitoring
Auditing and monitoring are key components of any information security program. One of the most helpful solutions that organizations use in this space is SIEM (security information and event management) systems. An article referencing SIEM can be found in this unit's study.
Explain in your own words the benefits of a SIEM system and how you believe these products can assist in the overall compliance of organizations.
Assignment 1
Performing Packet Capture and Traffic Analysis
Part 1 - Compare and contrast the uses of Net Witness Investigator and Wireshark. Include a discussion of the value of the data collected for each.
Part 2 - Security Planning: Monitoring and Access Request Approvals Presentation
Write the following using information found in the Course Security Scenario as context.
1. Monitoring (1 page).
2. Access Request Approvals (1-2 pages).
Part 3 - Create a 10-15-minute presentation (using a common presentation software of your choice) that describes Monitoring and Access Request Approvals policies that you would recommend to stakeholders interested in organizational security for the company described in the Course Security Scenario.
Your presentation must include audio narration with supporting visual depictions.
Consider the following scoring guide criteria as you complete your assignment:
- Create a monitoring policy that is appropriate for the Course Security Scenario.
- Create an access request approvals policy that is appropriate for the Course Security Scenario.
- Compare and contrast the uses of Net Witness Investigator and Wires hark and the value of the data collected.
- Create a presentation that accurately communicates a security plan to stakeholders.
Attachment:- Presentation.rar