What are the phases of the intelligence cycle

Assignment Help Computer Engineering
Reference no: EM133325195

Case Study-1: Identify Security Control Types

1. Despite operating a patch management program, your company has been exposed to several attacks over the last few months. You have drafted a policy to require a lessons- learned incident report be created to review the historical attacks and to make this analysis a requirement following future attacks. How can this type of control be classified?

2. A bespoke application used by your company has been the target of malware. The developers have created signatures for the application's binaries, and these have been added to endpoint detection and response {EDR} scanning software running on each workstation. If a scan shows that a binary image no longer matches its signature, an administrative alert is generated. What type of security control is this?

3. Your company is interested in implementing routine backups of all customer databases. This will help uphold availability because you will be able to quickly and easily restore the backed-up copy, and it will also help uphold integrity in case someone tampers with the database. What controls can you implement to round out your risk mitigation strategy and uphold the components of the CIA triad?

Case Study-2: Investigating Threat Data and Intelligence

1. Your chief information security officer {CISOi wants to develop a new collection and analysis platform that will enable the security team to extract actionable data from its assets. The CISD would like your input as far as which data sources to draw from as part of the new collection platform, worrying that collecting from too many sources, or not enough, could impede the company's ability to analyze information. Is this a valid concern, and how can it be addressed within an intelligence life-cycle model?

2. What are the characteristics to use to evaluate threat data and intelligence sources?

3. What are the phases of the intelligence cycle?

Reference no: EM133325195

Questions Cloud

Intervention strategies for individuals coping with trauma : Contrast at least two recommended group intervention strategies for individuals coping with trauma
Determine what job enrichment is available in help desk jobs : Determine what job enrichment is available in help desk jobs. Use an Internet search engine, such as Google, to research job enrichment.
Pick a federal regulation that deals specifically with cyber : Pick a federal regulation that deals specifically with Cybercrime, either from the readings or from your own research. Then look at our state regulation
Context of the definition and sanction of deviance : Explain the importance of social resources in the context of the definition and sanction of deviance.
What are the phases of the intelligence cycle : What are the characteristics to use to evaluate threat data and intelligence sources? What are the phases of the intelligence cycle?
What is the corporate strategy of the company : HRPD 712 Human Resource Strategy Centennial College - What is the mission, vision and values of the company? How does each shape the strategic direction
Alcoholics anonymous is based about what theoretical model : Alcoholics anonymous is based about what theoretical model? Drug courts are based upon what theoretical model?
Democratic republic of the congo : Democratic republic of the Congo are facing know that some people is not available to have energy.
What is the difference between a san and a nas : What is the difference between a SAN and a NAS? Which one will give you the best performance for virtual machines?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd