Information security policies-procedures and cybersecurity

Assignment Help Basic Computer Science
Reference no: EM132369481

PART ONE

Location of suspicious network traffic, knowledge of networks that generate troublesome traffic, and identification of network problems are some of the reasons why a cybersecurity professional would investigate network traffic. However, a major reason is to detect which traffic might be the cause of a cybercrime.

For this task, imagine that the program director of the cybersecurity unit in a local college has requested that you give a presentation on tools used to extract network packets for an investigation of a cybercrime on the finances of the college. It may help to select a specific college with which you are familiar.

In your presentation, you should address the following

Provide an introduction explaining the relevance of capturing network traffic for investigation purposes.

Provide a summary by stating the best tool(s) that you believe should be used in network traffic analysis for the cybercrime on the local college finances.

Delineate a course of action and determine the benefits that will be gained from implementing the recommended tools.

Include a Word document with the table below filled in, which you will provide as a handout to your audience.

Network Analysis ToolOperating systemBrief explanation of useTcpdump Windump Netintercept Wireshark Commview BillSniff MaaTec Network Analyzer EtherDetect packet Sniffer etherApe ntop NetSetMan

References: Support your presentation with at least 4 scholarly or industry references

Keep your audience in mind. Remember you are not preparing this for an academic audience. Your audience will not care about theoretical or conceptual issues in information security and healthcare in particular. They will only care about specific issues, strategies, and scenarios that are relevant to their organization.

Length: 5-7 slides (with a separate reference slide)

Notes Length: 200-350 words for each slide (in lieu of speaker notes, you may record a video or screen capture of yourself delivering the presentation, upload it to a video-sharing site such as YouTube, and submit the presentation along with a link to where the video can be viewed).

Be sure to include citations for quotations and paraphrases with references in APA format and style where appropriate. Save the file as PPT with the correct course code information.

PART TWO

Information Security Policies, Procedures, and Cybersecurity

Risk management helps in the identification of vulnerabilities and threats to information resources used by an organization. The process of risk management helps organizations in deciding what countermeasures, if any, to take in reducing risk to an acceptable level based on the value of the resource. The implementation of policies, standards, procedures, guidelines, and controls help organizations achieve a better security posture. In most organizations, information security policies are a primary element of cybersecurity and governance.

Information security policies and procedures reflect management standards. Guidelines help people conform to the required standards but are not mandatory. Guidelines use softer language than standards and are customized for the intended audience. As a cybersecurity professional, it is important to have an in-depth knowledge of the security policy of an organization to help with compliance and legal issues inside and outside the organization.

For this task, you will address information security policies, standards, procedures, guidelines, and controls. Address the following in your paper:

Differentiate between policy, standard, procedure, guideline, and control.

Describe the characteristics of a successful policy.

Outline in a diagram format the security policy lifecycle.

Outline the components of an information security policy.

Using the table below, define and explain the five most relevance policy that a cybersecurity professional should implement to help promote the security posture of the organization.

Outline the policy impact assessment to a production environment that deals with protected information.

Policy nameDescription/PurposeScope

Length: 1 page table, and a 5-6 page paper, not including titles and reference pages.

References: a minimum of 8 resources

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards

Reference no: EM132369481

Questions Cloud

What is your definition of data visualization : What is your definition of Data Visualization? How has your past knowledge or experiences helped you to develop your definition?
Define concept of culture including surface and deep culture : Explain the concept of culture, including surface and deep culture, and how it influences children's development and learning. Explain the importance of culture
Evaluate the marketing strategies employed : Open your web browser and search for recent health care advertisements from similar health care services, facilities, or other health sector-related occupations
What do you think about the workshop itself : What do you think about the workshop itself? Based on the workshop description what do you think the popularity will be? Will it be engaging?
Information security policies-procedures and cybersecurity : Information Security Policies, Procedures and Cybersecurity. Describe characteristics of successful policy. Outline in diagram format security policy lifecycle.
What are the demographics of your participants : What are the demographics of your participants? How did you pick this sample? That is, what kind of sampling sampling did you use?
Determine which one did you most enjoy : As we come to the end of quarter and reflect on the speeches delivered in COM201, which one did you most enjoy? Provide a thorough explanation for your choice.
What will the environment need to be like : As an instructional designer, consider the different elements that should be considered when presenting material digitally or when creating an online classroom.
How component works in overall cybersecurity architecture : Describe how the component works in an overall cybersecurity architecture. Take care to describe how it provides defense to protect the organization's data,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd