What are the risks associated with logging too many events

Assignment Help Management Information Sys
Reference no: EM132173493 , Length: 2

Write a 2 to 2.5 Page paper in Microsoft Word answering the following questions regarding creating and analyzing audit logs in Microsoft Active Directory.

Think about the challenges of getting all of the Active Directory audit policy settings right. For an infrastructure administrator, how important are these types of settings?

What are the risks associated with logging too little data or not auditing the correct events?

What are the risks associated with logging too many events?

When the default configuration is to create audit logs, what impact can this have on security incident investigations?

This was just a single domain with two systems on a local LAN. How much more complicated would auditing and log management be for 100 computers? What about an enterprise with 10,000 computers in several domains on their LAN/WAN?

Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What challenges might there be managing audit policies and logs in such an environment?

Finally, conclude this week's assignment with a page explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

Reference no: EM132173493

Questions Cloud

Which the employer violated the EPPA or FCRA : Submit a 3-5 page paper on employee privacy rights, especially a situation in which the employer violated the EPPA or FCRA, if applicable.
Do you think you could store everything you produce : Do you think you could store everything you produce in your academic career in a single cloud storage account?
Calculate the number of employees : The wages are equal to 0.5. The question asks to calculate the number of employees? and How to allocate them between industries?
Calculate the depreciation and the book value : Calculate the depreciation and the book value of this equipment for the next 7 years. Use both straight-line and double declining balance depreciation methods.
What are the risks associated with logging too many events : When the default configuration is to create audit logs, what impact can this have on security incident investigations?
What is the net present worth of the operation : An investor is purchasing a car repair facility with an initial cost of $90M. The facility will have before tax profit of $25M/Yr the first two years.
Explain how ingratiation helps a negotiator : When is it a good idea to let others draw their own conclusion? When is it dangerous to let others draw their own conclusions?
Reduction in the money supply on the economy : You may assume that the economy begins in long-run equilibrium. Be sure to show that impact on output and the price level on both the short and the long run?
Contradictions that effective project manager must face : Identify and give an example of three out of the six contradictions that an effective project manager must face.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about the denormalization functionality

Having an adequate data model to serve specific business needs of an organization is important. Evaluate the need for denormalization within an organization.

  Evaluate the two major information delivery methods

Evaluate the two major information delivery methods in mobile commerce - data security of information transmitted in the wireless network

  Research paper on cloud computing

Research the speculations on where the state-of-the-art will be in the near future for one of the following technologies. Your paper should include a description of the state-of-the-art in your technology, a discussion of where the sources that yo..

  Research the key terms applications software

Research the key terms "Applications Software", "Application Design", "Software Design"; find a journal publication pertaining to the subject, and write a 1-2 pages APA format report, summarizing the paper.

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Identify it threats with regard to protecting the asset

For each of the following assets, assign an owner, explain their responsibilities, and identify IT threats with regard to protecting the asset.

  Discuss about the small business global

In 500 words (minimum), discuss whether you would consider taking your proposed small business global? Why or why not?

  Failed technology investment

Stopping a failed technology - failed technology investment versus "plowing ahead," believing success is still possible?

  How will requirement documents be used and maintained

How will requirement documents be used and maintained, especially as requirements evolve?

  Create a data flow diagram of some system

Create a data flow diagram of some system. Can use a real world example or a hypothetical one. Write a summary explaining the data flow diagram and trust boundaries. Using STRIDE with the Data Flow Diagram, provide a list of threats against t..

  Describe the usability properties of interactive systems

Evaluate how section 508 affects developing user interfaces and assess this compliancy standard's impact on users. Give three (3) examples of available tools for verifying that your interfaces meet universal design guidelines and the advantages and..

  Can an it system exist without a persistent data repository

Can an IT system (client/server or web based) exist without a persistent data repository? If so how, and are there any caveats with this approach?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd