100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CYB 220 TECHNOLOGY EVALUATION CRITERIA WORKSHEET MODULE 5 SOUTHERN NEWHAMPSHIRE UNIVERSITY

Rating
-
Sold
-
Pages
7
Uploaded on
12-04-2024
Written in
2023/2024

CYB 220 TECHNOLOGY EVALUATION CRITERIA WORKSHEET MODULE 5 SOUTHERN NEW HAMPSHIRE UNIVERSITY










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
April 12, 2024
Number of pages
7
Written in
2023/2024
Type
Exam (elaborations)
Contains
Unknown

Subjects

  • cyb 220

Content preview

CYB 220 TECHNOLOGY EVALUATION CRITERIA WORKSHEET
MODULE 5 SOUTHERN NEWHAMPSHIRE UNIVERSITY
For each section of this worksheet, fill in the empty cells with the required information.
Technology Evaluation Criteria Table
Evaluation
FactorEvaluation CriteriaManager’s Questions—
Aligned to CriteriaRelevant Organizational Security Plan Information (From Scenario) EffectivenessAbility to identify network-connected
systems1.a.
2.a.i.1.a: What are the organizational attributes? 150-200 Employees, 4 restricted segmented networks for each department w/req for remote access
2.a.i: What is the level of concern about who’s on (or off) the network? There is a requirement to be able identify anyone with
malicious intent.
Ability to discern operating systems of network-
connected systems1.b.
2.a.ii.1.b: What are the organizational constraints? There are up to 200 hosts on the network, most likely all using the same OS due to simplicity.
2.a.ii: What is the level of concern about detailed information relating to specific assets on (or off) the network? Detailed tracking of assets w/ip add. and mac add. needs to be accomplished to be able to
identify insider threats with up to 200 hosts on the network.
Ability to discern specific software applications based on their unique data flows1.a.
1.b.
2.a.iii.
2.a.v.1.a: What are the organizational attributes? There are 4 departments within the company, narrowing down unique data from an application should be simple.
1.b: What are the organizational constraints? The risk for false positives is high due to the unorthodox method of tracking software applications
2.a.iii: What is the level of concern about the ability to defeat secure communications? High, having secure comms broken would leave the organization vulnerable and indicate there is a larger threat lurking 2.a.v: What is the level of concern about potential for harm? High, all attempts need to be exhausted to protect customer PII

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartzone Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3207
Member since
5 year
Number of followers
2291
Documents
14424
Last sold
8 hours ago
AMAIZING EDUCATION WORLD

GET ALL KIND OF EXAMS ON THIS PAGE ,COMPLETE TEST BANKS,SUMMARIES,STUDY GUIDES,PROJECT PAPERS,ASSIGNMENTS,CASE STUDIES, YOU CAN ALSO COMMUNICATE WITH THE SELLER FOR ANY PRE-ORDER,ORDER AND ETC.

3.7

584 reviews

5
260
4
93
3
103
2
29
1
99

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions