IT Security Risks and Anomaly DetectionPart A: Choose an enterprise
IT Security Risks and Anomaly Detection
Part A: Choose an enterprise
that operates a global data network. Analyze the various types of risk confronting the enterprise. Then, a report for potential investors that includes the following:
· An overview of the organization, its industry, its mission, and its core business processes.
· A risk matrix that quantifies the risks to enterprise network operations.
· An analysis of the risks and threats to the enterprise network that you identified.
· An analysis of risk controls to mitigate identified risks.
· Specific recommendations for the implementation of risk controls that are appropriate for mitigating the risks you identified.
· An explanation of the optimal risk assessment methodology for the enterprise IT network situation.
Part B: Choose an enterprise that operates a global data network. Analyze various types of potential security events, and a report for an executive management team that includes the following information:
-Explain how anomalies in network traffic or usage may indicate a security event.
-Explain how log files can be used to determine the legitimacy of anomalous traffic.
-Identify and describe three specific security events that may cause anomalous traffic.
-Describe security controls and specific defense mechanisms to mitigate these security events.· Provide validation and support for arguments and your ideas by citing relevant examples and supporting evidence.
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"
