Describe what audit data is and how it is used

Assignment Help Management Information Sys
Reference no: EM131258728

Intrusion Tools and Techniques

Your company wishes to ensure that if and when an intrusion happens they can detect it and determine the extent. You have been asked to write a white paper that describes the importance of collecting audit data and the importance of reviewing that data.

This first assignment will allow you to establish The Key Assignment Template that will be used throughout the class for all Individual Project submissions and to explore the framework securing an organization's data. You will:

• Create the template to be used for the submission of all Individual Project Assignments
• Describe what audit data is and how it is used.
• In the framework of the network and servers what devices should audit data be collected and where it should be stored.
• Describe a process or policy for how and when audit data should be reviewed.
• Also take this opportunity to discuss the security of audit data, meaning, just because data is collected and reviewed, does this mean it is secure and accurate.

The template document should follow this format:

• Vulnerability Assessment Project Document Shell
• Use Microsoft Word
• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents

o Use auto-generated TOC.
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o Intrusion Tools and Techniques
o Common Vulnerabilities and Exposures
o Attack Methods
o Intrusion Detection System Policies
o Protective Measures

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

• Intrusion Tools and Techniques (Week 1 - IP)

o Intrusion Detection
o Auditing
o Audit Data Review.

Reference no: EM131258728

Questions Cloud

Which item should be stored at the very front : Which item should be stored at the very front (closest to the dock)? - Which item should be stored at the very back (furthest from the dock)?
Calculate the equilib-rium constant at 25°c for the reaction : If there is no water vapor in the air, the oxygen partial pressure would have been 0.2. Assuming that nitrogen, oxygen, and water vapor are the only important contributors to the gas pressure, calculate the equilib-rium constant at 25°C for the re..
What were total maintenance costs when company experienced : Song, Inc., uses the high-low method to analyze cost behavior. The company observed that at 20,000 machine hours of activity, total maintenance costs averaged $34.30 per hour. On the basis of this information, the fixed cost was. On the basis of this..
How do media positively or negatively influence public image : The media, and Hollywood in particular, represent one avenue in which the general public becomes familiar with the role of nurses. How does the media positively or negatively influence the public's image of nursing? What other avenues may better ..
Describe what audit data is and how it is used : Describe what audit data is and how it is used. In the framework of the network and servers what devices should audit data be collected and where it should be stored. Describe a process or policy for how and when audit data should be reviewed.
What are the variable costs per unit : The variable costs per unit are $18 when a company produces 24,000 units of product. What are the variable costs per unit when 26,000 units are produced? The fixed costs per unit are $20 when a company produces 20,000 units of product. What are the f..
What training will need to be done prior to implementation : Now that you have identified the data sets, discussed the electronic health record (EHR) and computerized physician order entry (CPOE), and identified patient demographic information data elements that are necessary for the new system, you will be..
What are three basic approaches to negotiations : What is vertical integration? Give examples of backward and forward integration ? What are three basic approaches to negotiations?
Craft a security management plan for your organization : As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Risks of natural events mitigated through control

How are the risks of natural events mitigated through control measures of physical security? Why has business continuity been recognized as a fundamental component of management's role in achieving good corporate governance

  Which parameter is not part of defining network performance

Which parameter is not part of defining network performance? Which parameter is not part of defining network response time

  Determine the medium through which the office staff prefers

Determine the medium through which the office staff prefers to communicate, wether it is a presentation, e-mail or a printed presentation.

  Privacy raised by using information systems

Information systems - List three potential concerns related to privacy raised by using information systems.

  Write paper on advising clambake company on their future is

Cross-Organizational Systems Consider the following scenario regarding the Clambake Company and decisions they need to make regarding their information systems (IS). Write a one-page (250-word) paper advising the Clambake Company on their future IS

  Pros and cons to implementing a switched network

Imagine that you work as a network administrator for a medium-size company. You have suggested to your boss to upgrade the existing hubs with Cisco Catalysts switches. Provide justification for this action. Include at least three (3) pros and thre..

  Three fundamental control structure

Three Fundamental Control Structures - Review fundamental control structures. Does not it look strange and surprising that any computer program can be constructed as a combination of only these three structures?

  Company''s use of extranets

Company's Use of Extranets - What strategic competitive benefits do you see in a company's use of extranets?

  Explain business processes and technology

Business Processes and Technology: Knowledge Management - Articulate and defend your opinion of this statement.

  Which software-development methodology would be best

Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why? Give an example of a comp..

  Explain why knowledge that we are storing exabytes of data

Explain why the knowledge that we are storing exabytes of data is important to decision making. Name and describe three decision-making applications of stored data not mentioned in this chapter.

  Osi model presentation layeri need to write out a excellent

osi model presentation layeri need to write out a excellent explanation of the presentation layer of the osi model. be

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd