Key components of any information security program

Assignment Help Basic Computer Science
Reference no: EM132403508

Discussion 1

Auditing and Monitoring

Auditing and monitoring are key components of any information security program. One of the most helpful solutions that organizations use in this space is SIEM (security information and event management) systems. An article referencing SIEM can be found in this unit's study.

Explain in your own words the benefits of a SIEM system and how you believe these products can assist in the overall compliance of organizations.

Assignment 1

Performing Packet Capture and Traffic Analysis

Part 1 - Compare and contrast the uses of Net Witness Investigator and Wireshark. Include a discussion of the value of the data collected for each.

Part 2 - Security Planning: Monitoring and Access Request Approvals Presentation

Write the following using information found in the Course Security Scenario as context.

1. Monitoring (1 page).

2. Access Request Approvals (1-2 pages).

Part 3 - Create a 10-15-minute presentation (using a common presentation software of your choice) that describes Monitoring and Access Request Approvals policies that you would recommend to stakeholders interested in organizational security for the company described in the Course Security Scenario.

Your presentation must include audio narration with supporting visual depictions.

Consider the following scoring guide criteria as you complete your assignment:

- Create a monitoring policy that is appropriate for the Course Security Scenario.

- Create an access request approvals policy that is appropriate for the Course Security Scenario.

- Compare and contrast the uses of Net Witness Investigator and Wires hark and the value of the data collected.

- Create a presentation that accurately communicates a security plan to stakeholders.

Attachment:- Presentation.rar

Reference no: EM132403508

Questions Cloud

Explain the term usage of trade : Explain the term usage of trade. What happens if there is a conflict between the express terms of the contract and trade usage?
What are planning and control systems : What are planning and control systems?
Write description of the purported mechanism of action : Many clients may disagree with taking medications for fear of side effects, becoming "dependent" on the medication, having to take the medication for the rest.
Parties because of the loan provision : Barbara then claimed that the contract was not binding because the contract did not impose an obligation on both parties because of the loan provision
Key components of any information security program : Auditing and monitoring are key components of any information security program. One of the most helpful solutions that organizations use in this space is SIEM
Discuss whether or not candi made an offer to larry : Discuss whether or not Candi made an offer to Larry to design the holiday gown.Can Candie by sued by Larry?
People waiting for the bus : You are driving along in your car on a wild, stormy night, when you pass by a bus stop, and you see three people waiting for the bus:
Discuss case-specific cultural factors : You are required to discuss case-specific cultural factors as well as legal and ethical issues present in each case. Your responses must be 2 pages in length.
Will she be successful in her loan application : She seeks your advice. Will she be successful in her loan application? Give reasons for your answer.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd