· Lesson 4: Enabling Intrusion Prevention and Detection
· Lesson 5: Configuring SNORT
uCertify Cybersecurity Essentials LiveLabs
· Lesson 5: Using Microsoft File Encryption Tools
Using your lab results, write a 2- to 3-page analysis that provides an assessment of technical security management methods found in the labs and the reading. You should identify a minimum of three methods as well as specifying what element the technical security management method relates to, such as intrusion detection, encryption, or access control. An example would be discovering that the organization has no classification system in place for categorizing data as being public, sensitive, or secret. The mitigation strategy would be establishing a consistent classification standard that would in turn inform how each category of data is accessed and stored.
Unit 5 Assignment: Technical Security Management
Outcomes addressed in this activity:
Unit Outcomes:
· Prepare a technical scenario concisely and persuasively.
· Use appropriate cybersecurity terminology to meet business needs.
Course Outcome:
IT537-3: Analyze technical scenario elements to determine strategy.
Purpose
Technical Security Management has several important functions including adherence to the company’s security policies, business application security standards, cloud security standards, encryption management, intrusion detection and prevention, as well as malware protection and secure coding practices. These are all used to provide the organization with a sound and effective security infrastructure that protects the network in a consistent and centrally managed manner.
Assignment Instructions
Create an analysis assessing a minimum of three technical security management methods discovered in your lab results and the reading. Feel free to include more methods in your analysis, but three should be the minimum. Be sure to note whether the technical security management method is specific to a physical on-premises component or a cloud/virtual component. Following your technical security management analysis, provide 23 pages of discussion that includes a description of the technical security management methods, how each of the methods relates to risk for the organization, and how each method mitigates that risk.
Recent Comments