Reference no: EM133325195
Case Study-1: Identify Security Control Types
1. Despite operating a patch management program, your company has been exposed to several attacks over the last few months. You have drafted a policy to require a lessons- learned incident report be created to review the historical attacks and to make this analysis a requirement following future attacks. How can this type of control be classified?
2. A bespoke application used by your company has been the target of malware. The developers have created signatures for the application's binaries, and these have been added to endpoint detection and response {EDR} scanning software running on each workstation. If a scan shows that a binary image no longer matches its signature, an administrative alert is generated. What type of security control is this?
3. Your company is interested in implementing routine backups of all customer databases. This will help uphold availability because you will be able to quickly and easily restore the backed-up copy, and it will also help uphold integrity in case someone tampers with the database. What controls can you implement to round out your risk mitigation strategy and uphold the components of the CIA triad?
Case Study-2: Investigating Threat Data and Intelligence
1. Your chief information security officer {CISOi wants to develop a new collection and analysis platform that will enable the security team to extract actionable data from its assets. The CISD would like your input as far as which data sources to draw from as part of the new collection platform, worrying that collecting from too many sources, or not enough, could impede the company's ability to analyze information. Is this a valid concern, and how can it be addressed within an intelligence life-cycle model?
2. What are the characteristics to use to evaluate threat data and intelligence sources?
3. What are the phases of the intelligence cycle?