Reference no: EM133597238
Assignment:
The purpose of this assignment is to analyze a corporate profile to develop a proposal outlining the need for and benefits of implementing a SOC within the selected organization.
When it comes to security, every organization is unique. Trust relationships are pivotal to ensure the development of a healthy organizational security culture. It is easy to try to make a one-size-fits-all solution, but that method is doomed to fail. A SOC can encompass the concepts of a healthy and well-defined security culture, and can positively transform the effectiveness for how an organization approaches security.
Examine the need for a Security Operations Center (SOC) and how the company would benefit from implementing a SOC.
In a proposal paper to upper management, summarize the company's security culture by addressing the following. This will be the Security Culture Summary section in the IT Proposal.
1. Compare and contrast the various aspects of cybersecurity, including the relationship between cyber operations, cybercrime, and cyber law.
2. Describe six elements within the SOC that will help the company build a healthy security culture.
3. Explain how the SOC will be significant to the security culture of the selected company.
4. Identify key actors of SOC operations.
Explain how the SOC Analyst will apply their knowledge to develop, manage, and access a security program by identifying goals, objectives and metrics. Use the aspects one by one below as a guiding framework:
- Physical Security
- Personnel Security
- System and Data Identification
- System Security Plans.
- Configuration and Patch Management
- System Documentation
- Incident Response Program
- Disaster Recovery Program.
- Certification and Accreditation
- Least Privileges
- Fail Safe/Fail Secure
- Discuss how security awareness, training, and education will be accomplished.
How it could be relevant to a forensics investigation
: Discuss the Event ID 4722 and explain how it could be relevant to a forensics investigation.
|
What is network configuration management
: Does the software you chose provide network configuration management, network monitoring, or both?
|
Discuss the nist framework has evolved over time
: Explore updates and revisions, and discuss emerging trends in cybersecurity that the framework may need to address in the future.
|
Types of cloud computing
: Three cloud computing service models. Potential benefits and risks of migrating the company's technical infrastructure to the cloud.
|
Relationship between cyber operations and cybercrime
: Compare and contrast the various aspects of cybersecurity, including the relationship between cyber operations, cybercrime, and cyber law.
|
Describe villa tugendhat
: Describe Villa tugendhat. Location, designer(s), function. Identify the main architectural features and construction elements of the building.
|
What is a historical cyber attack from within past 10 year
: What is a historical cyber attack from within the past 10 years, document/explain the key aspects of the attack.
|
Which team engages in offensive tactics
: During a cybersecurity exercise, which team engages in offensive tactics?
|
How does mim attack handshake of asymmetric cryptography
: How does MIM attack work during the handshake of Asymmetric cryptography?
|