What security tools do you need to implement to monitor

Assignment Help Computer Engineering
Reference no: EM133473277

Assignment: Risk Mitigation Plan

Based on your work developing a Risk Mitigation Plan, you will be ready to draft a Risk Management Security Plan for management, proposing specific tools and policies for implementation. Your plan should include specific proposals for monitoring, control and reporting and six security policies that would safeguard your organization.

Objectives

1. Develop a Risk Management Security Plan
2. Research industry policies as a basis for developing risk management policies

Task

Your Risk Management Security Plan should include the following:

I. Introduction (brief background and overview)

II. Purpose of the Risk Management Security Plan (rationale for this document)

III. Risk Monitoring, Controlling, and Reporting

1. Monitoring: What security tools do you need to implement to monitor your organization? Provide at least three examples and an explanation of why you chose them.

2. Controlling: What levels of password management, user access, and elevated privileges (i.e., domain) need to be implemented at XYZ Corporation. Provide details and explanations for your decisions?

3. Reporting: What reporting capacity do you have implemented based on adoption of your monitoring tools?

IV. Policies

Research various ISO, SANS, COBIT or NIST policies and use these as a basis for drafting and customizing six policies that address the concerns of XYZ after the malware incident. Be sure to provide the details of each policy and to cite your research with links in APA format.

1. SANS Security Resources
2. ISO
3. NIST
4. COBIT.

Reference no: EM133473277

Questions Cloud

About our academic study of jewish women of the holocaust : What do you think is important about our academic study of Jewish Women of the Holocaust?
In what ways do we see americans fighting : In what ways do we see Americans fighting for the expansion of rights in this chapter? Chapter 8: Rebuilding a republic
What do you think gave him the internal strength : What do you think gave him the internal strength and courage to stay committed to non-violence during this time?
What were legal changes that came out of aftermath of fire : Why do you think Triangle fire finally became such a significant catalyst to legal reforms in New York and nationally after that static century of no change?
What security tools do you need to implement to monitor : What security tools do you need to implement to monitor your organization? Provide at least three examples and an explanation of why you chose them.
How can person exercise emotional intelligence : How can a person exercise emotional intelligence both personally and professionally? How can a person improve their use of emotional intelligence?
How did the atlantic slave trade destroy : How did the Atlantic Slave Trade destroy African captives' identities, and in what ways did American slaves create an African American identity with African
Describes how polynomials : Describes how polynomials can be used in the real world.,
What are the best ways to address the frustrations : What are the best ways to address the frustrations of women like Ellaha, who feel trapped in conservative Muslim cultures where women are at the mercy of their

Reviews

Write a Review

Computer Engineering Questions & Answers

  Show the size and widths of all the fields in the sram

Draw a detailed block diagram of a 24KB, 3-way set-associative cache with 32B blocks. Show the size and widths of all the fields in the SRAM.

  Write the code to prompt for and read a series

For each number if the number is less than 10 print the number times 3. If the number is 10 or greater print the number times 6.

  While assisting the coding manager in preparing for the

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Designing the decision table

Design a decision table to represent the kind of treatment to be given to the customer of Eye Tunes Music Club. Produce a structured English version on the basis of following dialogue obtained by Systems Analyst from client interview.

  Explain how some data is not suited to visualization

Choose at least two unstructured data sources and compare the differences between these sources. Explain how these differences may impact the ability.

  Create a program that can convert money

You are to create a program that can convert money from one system to another. (Going back & forth form USD - EURO or EURO - USD) At the start of your program.

  Write the business rules that are re?ected in the erd

Write the business rules that are re?ected in the ERD shown in Figure P2.15. (Note that the ERD reflects some simplifying assumptions. For example

  Define the type of input data used

express the type of input data used for a business related function.

  Produce a requirements document for a program

Produce a requirements document for a program that allows a company to send out personalized mailings, either by e-mail or through the postal service.

  Define authentication and list authentication mechanisms

Define authentication - List authentication mechanisms - Discuss the methodology of an attacker using a password cracker - Classify different attacks

  How can you use jstl in your workplace or where have you use

CIT 151 University of Notre Dame How can you use JSTL in your workplace or where have you used them before?

  What are the pros and cons of the given ideas

There have been many books and opinion pieces writ-ten about the impact of AI on jobs and ideas for societal responses to address the issues.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd