Overview Security analysts play an important role working alongside the computer

WRITE MY ESSAY

Overview
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security (CIS) critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization toward compliance. They are not meant to be used in isolation. Comparing an organization’s technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders.
Prompt
After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below:
Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders).
Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use.
Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified by policy, implementation, automation, or reporting to enhance security for the organization.
Subcontrol One: Describe the modification of the subcontrol and justify your recommendation.
Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation.
Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication.
Discuss the merits of using RSA encryption and the implementation of two-factor authentication.
Discuss how different forms of encryption may be used in VPN software.
What to Submit
Your submission should be 1 to 2 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example,

WRITE MY ESSAY

admin Avatar

Leave a Reply

Your email address will not be published. Required fields are marked *