Cyber Security Best Practices and Monitoring
Question 1. Explain five cyber security best practices, and for each one, explain what it is, why it is used, how it is used (not expected to implement but be able to explain), and an example on the context (organization, any security domain) where it can be used. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.
Question 2. Share three cyber security best practices that could be applied to the US government/military. For each, explain what it is, why it should be used, and its application (not expected to implement but be able to explain). I will understand if you include in this answer the best practice(s) that you have noted in question 1. But also try to look at from the unique angle of the US government as its needs could be unique. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.
Question 3. From the global perspective (a corporation that has IT spread across the world, US government/military, and worldwide cyber vigilance), explain three cyber security best practices, what they are, why they should be used, and how to use (not expected to implement but be able to explain). I will understand if you include in this answer the best practice(s) that you have noted in the above question(s). But also try to look at it from the global perspective and any unique need. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.
Question 4. Explain the importance of monitoring the IT infrastructure, and the expected frequency to monitor depending on the nature of the vulnerability. Provide one example of any single IT area of your choice that needs to be monitored with the proposed frequency to monitor. Examples of different IT areas to monitor could be a specific component of the network, or hardware, or Cloud, or database, or any particular software or tool or IT product, or a part of IT infrastructure, or patch management, etc. and you can choose any one IT area from this or anything else of your choice. Next, you propose how frequently you think it needs to be monitored based on your analysis. For example, it could require 24/7 monitoring or it needs to be once a day, or once a week but that will depend depending on the usage of the IT area by an organization It is also possible that one organization may have a more frequent need to monitor an IT area but a different organization may have a less frequent need to monitor this, and it depends on its business need and usage.
Next, study two tools of your choice that can be used for cyber security monitoring, Explain what it is, why it should be used, and how to use it (not expected to implement but be able to explain). You can choose a tool found in the course learning resource, or a different tool.
Question 5. For the SYO 601, explain any lessons that you have learned on domain 3 which is Implementation. It is not expected that you will have a complete mastery on this topic in one week, along with learning additional lessons. But this gives the students an exposure, if there is an interest.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
