Explaining the relevance of capturing network traffic

Assignment Help Other Subject
Reference no: EM132338016

Assignment: Part 1: Location of suspicious network traffic, knowledge of networks that generate troublesome traffic, and identification of network problems are some of the reasons why a cybersecurity professional would investigate network traffic. However, a major reason is to detect which traffic might be the cause of a cybercrime.

For this task, imagine that the program director of the cybersecurity unit in a local college has requested that you give a presentation on tools used to extract network packets for an investigation of a cybercrime on the finances of the college. It may help to select a specific college with which you are familiar.

In your presentation, you should address the following

1. Provide an introduction explaining the relevance of capturing network traffic for investigation purposes.

2. Provide a summary by stating the best tool(s) that you believe should be used in network traffic analysis for the cybercrime on the local college finances.

3. Delineate a course of action and determine the benefits that will be gained from implementing the recommended tools.

4. Include a Word document with the table below filled in, which you will provide as a handout to your audience.

Network Analysis ToolOperating systemBrief explanation of useTcpdump Windump Netintercept Wireshark Commview BillSniff MaaTec Network Analyzer EtherDetect packet Sniffer etherApe ntop NetSetMan

References: Support your presentation with at least 4 scholarly or industry references

Keep your audience in mind. Remember you are not preparing this for an academic audience. Your audience will not care about theoretical or conceptual issues in information security and healthcare in particular. They will only care about specific issues, strategies, and scenarios that are relevant to their organization.

Length: 5-7 slides (with a separate reference slide)

Notes Length: 200-350 words for each slide (in lieu of speaker notes, you may record a video or screen capture of yourself delivering the presentation, upload it to a video-sharing site such as YouTube, and submit the presentation along with a link to where the video can be viewed).

Be sure to include citations for quotations and paraphrases with references in APA format and style where appropriate. Save the file as PPT with the correct course code information.

Part 2: Information Security Policies, Procedures, and Cybersecurity

Risk management helps in the identification of vulnerabilities and threats to information resources used by an organization. The process of risk management helps organizations in deciding what countermeasures, if any, to take in reducing risk to an acceptable level based on the value of the resource. The implementation of policies, standards, procedures, guidelines, and controls help organizations achieve a better security posture. In most organizations, information security policies are a primary element of cybersecurity and governance.

Information security policies and procedures reflect management standards. Guidelines help people conform to the required standards but are not mandatory. Guidelines use softer language than standards and are customized for the intended audience. As a cybersecurity professional, it is important to have an in-depth knowledge of the security policy of an organization to help with compliance and legal issues inside and outside the organization.

For this task, you will address information security policies, standards, procedures, guidelines, and controls. Address the following in your paper:

1. Differentiate between policy, standard, procedure, guideline, and control.

2. Describe the characteristics of a successful policy.

3. Outline in a diagram format the security policy lifecycle.

4. Outline the components of an information security policy.

5. Using the table below, define and explain the five most relevance policy that a cybersecurity professional should implement to help promote the security posture of the organization.

6. Outline the policy impact assessment to a production environment that deals with protected information.

Policy nameDescription/PurposeScope

Length: 1 page table, and a 5-6 page paper, not including titles and reference pages.

References: a minimum of 8 resources

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

Reference no: EM132338016

Questions Cloud

Explain the roles and responsibilities of quantity surveyor : Higher National Diploma in Quantity Surveying & the Built Environment-QS 501-Management Accounting and Procedures-H2
Manage exchange rate risk : A country with significant exporting activity is Japan where consequently firms have to manage their exchange rate risk through active risk management.
Compare cloud characteristics vs cloud mechanisms : Compare and contrast cloud characteristics vs cloud mechanisms. Based on your compare and contrast analysis, what information do you think is most important.
Evaluate how this objective aligns to the company : Evaluate how this objective aligns to the company's vision or mission statement
Explaining the relevance of capturing network traffic : In your presentation, you should address the following: Provide an introduction explaining the relevance of capturing network traffic for investigation purposes
How component works in an overall cybersecurity architecture : Describe how the component works in an overall cybersecurity architecture. Take care to describe how it provides defense to protect the organization's data.
Write security vulnerability report using the organization : Write a 3 to 4-page security vulnerability report using the organization you chose in Week 1. To help you with the assignment, an internal review of your.
Post a brief description of the conflict that you selected : How you might use a negotiation approach to apply one or more dimensions of negotiation to facilitate the parties to move beyond their positions
Discuss the technological and financial risks : Read the scenario below and discuss the technological and financial risks the company in the scenario faces and what they could do to mitigate those risks.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd