100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Ensayo

CYB-220 Module 5-2: Technology Evaluation Criteria Worksheet

Puntuación
-
Vendido
-
Páginas
9
Grado
A+
Subido en
06-08-2023
Escrito en
2018/2019

CYB-220 Module 5-2: Technology Evaluation Criteria Worksheet Completed worksheet and responses. For reference or research only.

Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
6 de agosto de 2023
Número de páginas
9
Escrito en
2018/2019
Tipo
Ensayo
Profesor(es)
Desconocido
Grado
A+

Temas

Vista previa del contenido

CYB 220 Technology Evaluation Criteria Worksheet
For each section of this worksheet, fill in the empty cells with the required information.
Technology Evaluation Criteria Table
Evaluation
FactorEvaluation Criteria Manager’s Questions—
Aligned to CriteriaRelevant Organizational Security Plan Information (From Scenario)
EffectivenessAbility to identify network-connected systems1.a.
2.a.i.1.a. What are the organizational attributes?
The network architecture is comprised of four segments with restricted communications between segments. Each department is specific to a segment with IT requiring remote availability. Additionally, there are between 150-200 host devices or a 1:1 with the number of employees.
2.a.i. What is the level of concern about who’s on (or off) the network? The concern would be high, especially in light of recent unauthorized access attempts. Each event should be treated as an attempted breach until intent is confirmed
Ability to discern operating systems of network-connected systems1.b.
2.a.ii.1.b. What are the organizational constraints?
A centralized approach to host OS. This allows for system continuity regarding maintenance, security patches, and application monitoring.
2.a.ii. What is the level of concern about detailed information relating to specific assets on (or off) the network? High. HR and IT are responsible for safeguarding the private information of personnel and clients. All other departments are constrained to data within their segment. Evaluation
FactorEvaluation Criteria Manager’s Questions—
Aligned to CriteriaRelevant Organizational Security Plan Information (From Scenario)
Ability to discern specific software applications based on their unique data flows1.a.
1.b.
2.a.iii.
2.a.v.1.a. What are the organizational attributes?
These attributes may differ between departments depending on the applications in their workflow. A default grouping of approved open-
source apps should be created to standardize applications on all hosts and simplify monitoring.
1.b What are the organizational constraints?
As the organization is determined to utilize open-source tools as the first option, the risks for false positives may be increased. As mentioned above-defined software should be whitelisted to increase transparency for monitoring.
2.a.iii. What is the level of concern about the ability to defeat secure communications?
High. Breaking secure communications would mean exposing host devices and the network to attacks and risking data confidentiality and availability. 2.a.v. What is the level of concern about potential for harm?
High. If encrypted transmissions are intercepted, it poses a severe threat to the confidentiality of company and client data. Ability to handle encrypted data flows1.b.
2.a.iii.
2.a.v.1.b. What are the organizational constraints?
With the number of host devices present, the most significant constraint would be the current IT team.
2.a.iii. What is the level of concern about the ability to defeat secure communications?
High. If encrypted data is compromised, it puts the clients’ assets at risk and the assets and reputation of the institution.
2.a.v. What is the level of concern about potential for harm?
High. If encrypted data is intercepted and confidentiality is breached, it opens the institution up to litigation if client data is compromised.
$6.47
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Riveneye Southern New Hampshire University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
379
Miembro desde
4 año
Número de seguidores
225
Documentos
51
Última venta
4 meses hace

4.2

66 reseñas

5
43
4
10
3
2
2
4
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes