Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security requirements and goals for the preliminary security baseline activity

08/12/2021 Client: muhammad11 Deadline: 2 Day

Introduction

Security Analysis baseline

Scope

The scope should include network IT security for the whole organization.

Include the following areas in this portion of the SAR:

· Security requirements and goals for the preliminary security baseline activity.

· Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization.

· Network infrastructure and diagram, including configuration and connections. Describe the security posture with respect to these components and the security employed: local area network (LAN), metropolitan area network (MAN), wide area network (WAN), enterprise. Use these questions to guide you:

· What are the security risks and concerns?

· What are ways to get real-time understanding of the security posture at any time?

· How regularly should the security of the enterprise network be tested, and what type of tests should be used?

· What are the processes in play, or to be established to respond to an incident?

· Workforce skill is a critical success factor in any security program, and any security assessment must also review this component. Lack of a skilled workforce could also be a security vulnerability. Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required?

· Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?

· Describe the ways to detect these malicious codes and what tactics bad actors use for evading detection.

· Public and private access areas, web access points. Include in the network diagram the delineation between open and closed networks, where they coexist, and show the connections to the internet.

· Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?

· Operating systems, servers, network management systems as they relate to data in transit vulnerabilities:

· endpoint access vulnerabilities

· external storage vulnerabilities

· media access control and Ethernet vulnerabilities

· virtual private network vulnerabilities

· Possible applications. This network will incorporate a BYOD (bring your own device) policy in the future. The IT auditing team and leadership need to understand current mobile applications and possible future applications and other wireless integrations. You will use some of this information in Project 2 and also in Project 5.

The overall SAR should detail the security measures needed, or implementation status of those in progress, to address the identified vulnerabilities. Include:

· remediation

· mitigation

· countermeasures

· recovery

Through your research, provide the methods used to provide the protections and defenses.

From the identification of risk factors in the risk model, identify the appropriate security controls from NIST SP 800-53A and determine their applicability to the risks identified.

The baseline should make up at least three of the 12 pages of the overall report.

When you have completed your security analysis baseline, move on to the next step, in which you will use testing procedures that will help determine the company's overall network defense strategy.

Step 2

Within this portion of the SAR, explain the different testing types (black, white, and gray box testing).

Include these test plans in the SAR. The strategy should take up at least two of the 12 pages of the overall report.

Click the following link to learn more about cybersecurity for process control systems.

Step 3 :

it's time to define your penetration testing process. Include all involved processes, people, and time frame. Develop a letter of intent to the organization, and within the letter, include some formal rules of engagement (ROE). The process and any documents can be notional or can refer to actual use cases. If actual use cases are included, cite them using APA format.

This portion should be about two pages.

Step 4

Within this analysis, think about the cost of violations and other areas if you do not add the controls. Then add in the cost for implementing your controls.

When you have finished with the cost benefit analysis, which should be at least one page of your overall report,

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

High Quality Assignments
Pro Writer
Financial Analyst
Accounting & Finance Mentor
Fatimah Syeda
Accounting & Finance Specialist
Writer Writer Name Offer Chat
High Quality Assignments

ONLINE

High Quality Assignments

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$37 Chat With Writer
Pro Writer

ONLINE

Pro Writer

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$33 Chat With Writer
Financial Analyst

ONLINE

Financial Analyst

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$50 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$25 Chat With Writer
Fatimah Syeda

ONLINE

Fatimah Syeda

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$45 Chat With Writer
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$44 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Fundamental concepts of organizational behavior ppt - Economic Evaluations of Health Programs - Dusty heart timbre and trail - Prodoc software for instrumentation - Nursing - School districts in the united states sometimes capture media attention - Shoes and sox size guide - Picot question examples stroke - Ucl msc machine learning - 4908 interboro ave pittsburgh pa 15207 - Atkinson's flexible firm model - A system of two paint buckets connected by a lightweight rope - Angie's bake shop makes birthday chocolate chip cookies - The term _____________ describes circumstances where a country's exports exceed its imports. - Legacy of racism reflection essay - In formulating hypotheses for a statistical test of significance, the null hypothesis is often - Consulting - Which of these lines contains a metaphor - Dyes and dyeing organic chemistry lab report - PHYLOSOPHY - Short summary of there will come soft rains - Mkt 100 assignment 2 situation analysis - Delta air lines a the low cost carrier threat - Homework - Cissp 7th edition shon harris pdf - DB 2 Réponse - MG375 Discussion Post 4 - Poehling medical center has a single operating room - 5.9 8 explore network communications - Identify a social, environmental, or political problem that is of local, national, or global concern. - How to draw erd in mysql workbench - The walt disney company mission and vision - Rmit pre apprenticeship electrical - Identify the music of claude debussy - Activity based costing and management ppt - Wk5_dsdba - Apprentice to tradesman ratio qld - Final Paper - Bouygues construction south africa - Chapter Application - Helping skills facilitating exploration insight and action 4th ed pdf - ANA - IDM W 3 A - Cs12b ucsc - Altex inc manufactures two products car wheels and truck wheels - Concept Paper - Ernst mayr main findings - Business intelligence course syllabus pdf - Mini paper2 - Negotiating the curriculum educating for the 21st century - Where are fire extinguishers located - PHI-413-107200 Ethical and spiritual decision Marking - My brother's peculiar chicken moral lesson - How big is a6 in mm - Wheat weight per cubic metre - Writing Assignment - Case Study 2 Southwest Airlines Flight 812 - Telepictures warner bros television - Bookkeeping for dummies cheat sheet - Acetylene explosion in van - Why do mergers and acquisitions sometimes fail to produce anticipated results? - Ato frcgw clearance certificate - Quantative Methods/MAT105 - One step backward taken robert frost - Civil and infrastructure engineering rmit - Grade a stamford ct weekly circular - Cultural Misunderstanding Presentation - Chapter 18 prentice hall chemistry answers - Cystic fibrosis is a recessive genetic disorder ron is homozygous - Pediatric soap note - The crucible 1996 characters - Single phase controlled rectifier circuit - Coal a human history - Indra nooyi interview questions and answers - The last will and testament of rosalind leigh explanation - develop E.R diagram, redraw case diagram, normalize relation - Taco bell jobs for 16 year olds - Data Analysis - External influences on food choices - Project- communication and teamwork - level 3 and level 4 - How old was john flynn when he died - What inventory method does pepsico use - Psychology unit 2 aos 2 - What size dna fragments travel further - Kohlberg’s Stages of Moral Development - Research paper - Is uber an ethical company - W2. Discussion - Is fort street high school good - Cloud computing - DISCUSSION GRAD SCHOOL APA FORMAT PT 2 - Www state nj us treasury taxation eitcrefund shtml - 26553 s jacob dr channahon il 60410 - What is cisco cws - Symbolism assignment - If the ka of a monoprotic weak acid is - Accounting 201 Rephrase in own words - Ryan boot company comprehensive problem - Lady joan mcinnes hardy - Frensham school julie a gillick