Question

In: Computer Science

Develop, assess, and document security policies, practices, and procedures?

A-2 Develop, assess, and document security policies, practices, and procedures?

C-1 Identify and assess current and anticipated security risks and vulnerabilities?

C-2 Evaluate current and emerging tools and technologies?

Solutions

Expert Solution

Below must be followed as a part of security policy and procedure-

1. Periodic software updates should be installed in order to have the latest patches capable of handling latest threats.

2. All the nodes connected to the network should have a recognised and world recommended Anti-virus software.

3. Auditing—These procedures can include what to audit, how to maintain audit logs, and the goals of what is being audited.

4. Administrative—These procedures can be used to have a separation of duties among the people charged with operating and monitoring the systems. These procedures are where you can show that database administrators should not be watching the firewall logs.

5. Access control—These procedures are an extension of administrative procedures that tell administrators how to configure authentication and other access control features of the various components.

6. Configuration—These procedures cover the firewalls, routers, switches, and operating systems.

7. Incident response—These procedures cover everything from detection to how to respond to the incident.

Ans 2- Anticipated security risks

Supercharged connectivity and the IoT will bring unmanaged risks

Crime syndicates will take quantum leap with crime-as-a-service

New regulations will bring compliance risks

Brand reputation and trust will be a target.

Below are the current risks-

1. Virus- viruses are malacious prgrams that have the capabilty to duplicate itself and performa malfunctions to the system

2. Advanced Phishing Scams

Most phishing scams are fairly transparent, and sophisticated users rarely fall for pop-ups asking for a password even though less-sophisticated users are still vulnerable to these

3. Denial of service attack

4. Ransomewares

Answer 3-

Current Tools -

1. Antiviruses and malware detectors-

These are the softwares specifically built to scan the computer files by comparing the contents with the virus signatures stored in its databases.

Emerging tools-

1. User-behavior analytics

Once someone's username and password are compromised, whoever has them can waltz onto a network and engage in all kinds of malicious behavior

2. Hardware authentiction-

Intel is moving in that direction with the Authenticate solution in its new, sixth-generation Core vPro processor. It can combine a variety of hardware-enhanced factors at the same time to validate a user's identity.


Related Solutions

Having security policies and procedures that document and manage access to critical data and technology is...
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
learn about the concept of Internal Control. This is the policies, procedures and practices that a...
learn about the concept of Internal Control. This is the policies, procedures and practices that a company puts in place to make sure that company assets are protected and that the company's accounting records are true and accurate. The material in the chapter that discusses the Sarbanes-Oxley Act emphasizes how important Internal Controls are and the penalties that can be imposed on a company for not following good internal control practices. Please answer the following questions regarding Internal Controls. Questions...
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another.
Authentication, Authorization, AccountingHaving security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
Explain the importance of adhering to(Rogers)company policies, procedures, principles and practices.
Explain the importance of adhering to(Rogers)company policies, procedures, principles and practices.
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls.
Security Mitigation Plan discuss the following Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine authentication strategy. Determine intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures. Develop education plan for employees on security protocols and appropriate use. Provide risk response. Avoidance Transference Mitigation Acceptance Address change Management/Version Control. Outline acceptable use of organizational assets and data. Present employee policies (separation of duties/training). Explain incident response. Incident types/category definitions Roles and responsibilities Reporting requirements/escalation Cyber-incident response...
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls....
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine an authentication strategy. Determine an intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures.
Develop a process to assess the security posture of the service provider. What security requirements should...
Develop a process to assess the security posture of the service provider. What security requirements should your organization have? Define security requirements in a cloud-based environment that should be part of your standard.
What are the key policies, procedures, operating practices, or core values underlying Southwest's efforts to implement...
What are the key policies, procedures, operating practices, or core values underlying Southwest's efforts to implement and execute its low cost/no frills strategy?
Imagine you are CEO of a local hospital. Which policies and procedures would you develop and...
Imagine you are CEO of a local hospital. Which policies and procedures would you develop and deploy in order to facilitate superior strategy execution? Natalie and Vinnie own the Mississippi River Brewing Company, a craft brewer and taproom in New Orleans. What actions could the partners take to realize full value from TQM or Six Sigma initiatives and promote a culture of operating excellence?
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure to address confidentiality, integrity, and availability of information. Answer the following please; What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition? When and why...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT