Cash-back offer from May 7th to 12th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 14.50

Unit 1 Ind Pro 2 Assessment

Question posted by
Online Tutor Profile
request

Unit 1 Ind Pro 2 Assessment

Your company wishes to ensure that if and when an intrusion happens they can detect it and determine the extent. You have been asked to write a white paper that describes the importance of collecting audit data and the importance of reviewing that data.

This first assignment will allow you to establish The Key Assignment Template that will be used throughout the class for all Individual Project submissions and to explore the framework securing an organization’s data. You will:

·         Create the template to be used for the submission of all Individual Project Assignments

·         Describe what audit data is and how it is used.

·         In the framework of the network and servers what devices should audit data be collected and where it should be stored.

·         Describe a process or policy for how and when audit data should be reviewed.

·         Also take this opportunity to discuss the security of audit data, meaning, just because data is collected and reviewed, does this mean it is secure and accurate.

The template document should follow this format:

·         Vulnerability Assessment Project Document Shell

·         Use Microsoft Word

·         Title Page

o    Course number and name

o    Project name

o    Student name

o    Date

·         Table of Contents

o    Use auto-generated TOC.

o    Separate page

o    Maximum of three levels deep

o    Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

·         Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o    Intrusion Tools and Techniques

o    Common Vulnerabilities and Exposures

o    Attack Methods

o    Intrusion Detection System Policies

o    Protective Measures

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

·         Intrusion Tools and Techniques (Week 1 – IP)

o    Intrusion Detection

o    Auditing

o    Audit Data Review

·         Common Vulnerabilities and Exposures (Week 2 – IP)

o    Definition of CVE

o    Calculation of CVSS

o    The use of the NVD

·         Attack Methods (Week 3 – IP)

o    A discussion about various attack mechanisms and vectors, including:

§  Authenticated and Unauthenticated

§  Active and Passive

·         Intrusion Detection System Policies (Week 4 –IP)

o    Policies

·         Protective Measures (Week 5 – IP)

o    Vulnerability Assessment

Add the discussion about auditing to the section titled: Intrusion Tools and Techniques.

Name the document CSS300_<First and Last Name>_IP1.doc.

 

Available Answer
$ 14.50

[Solved] Unit 1 Ind Pro 2 Assessment

  • This solution is not purchased yet.
  • Submitted On 12 Jul, 2017 01:01:45
Answer posted by
Online Tutor Profile
solution
Organizations are facing a serious issue of trying to protect its private information from non-honest and untrusted employees. Most organizations use the process of data auditing to circumvent the aspect of integrity within the involved organizations (Wang, B., Li, B., & Li, 2015). This paper is going to give some brief overview of intrusion techniques, common vulnerability, attack method, protection policy and conclude on the prevention measures that could prevent such issues from...
Buy now to view the complete solution
Other Similar Questions
User Profile
Brain...

Unit 1 Ind Pro 2 Assessment

Organizations are facing a serious issue of trying to protect its private information from non-honest and untrusted employees. Most organizations use the process of data auditing to circumvent the aspect of integrity within t...
User Profile
kimwo...

MATH125: Unit 1 Individual Project complete solution

MATH125: Unit 1 Individual Project Mathematical Modeling and Problem Solving All commonly used formulas for geometric objects are really mathematical models of the characteristics of physical objects.For example, the characte...
User Profile
Exper...

Unit 1 Investigation | Complete Solution

Individuals and for businesses are as follows:

As a number of alternative uses for individuals such as:

  1. Despite of setting up of software for all devices, now we would have to install only single sof...
User Profile
smart...

IT-295-1501-01 | Unit 1 Individual Project | Network Design and Configuration | Complete Solution

Network Design Discussion
The above network design shows the proposed network for the computerized system of the company. This diagram depicts the required hardware and their topological arrangement. This design conta...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35