Regulatory frameworks

 
 
 
 
 
 
Choose one of the following regulatory frameworks and discuss in detail its impacts on a particular enterprise or organization, ideally based on your own personal or professional experience.
Focus your discussion on how compliance with the regulation drove (or could drive) the design of network modification or the deployment of a security control. Alternately, you can discuss a case of regulatory noncompliance and its consequences. Consider the following:
Family Educational Rights and Privacy Act (FERPA).
Federal Information Security Management Act (FISMA)
Gramm–Leach–Bliley Act (GLBA).
Health Insurance Portability and Accountability Act (HIPAA).
Payment Card Industry Data Security Standard (PCI DSS).
Sarbanes–Oxley Act (SOX).
Another of your choosing.
 
The post Regulatory frameworks appeared first on homework handlers.

Threats to the confidentiality, integrity, and availability of data

 
 
 
 
 
While threats to the confidentiality, integrity, and availability of data may originate from many types of attackers, the information security threats from trusted insiders—such as employees, vendors, and contractors—can be particularly insidious because the attackers have legitimate credentials on enterprise systems and networks. Insider threats may be difficult to detect because it can be challenging to differentiate between potentially harmful actions and an employee’s authorized work.
 
Share a relevant story ideally based on your personal or professional experiences about how a security incident originated with an attack vector that was opened, either maliciously or accidentally, by a trusted insider. Focus your discussion on the features that make this particular insider attack unique by describing the salient features of the attack, when and how the breach incident was discovered, the data that was illegally accessed, and the short- and long-term consequences of the attack to the organization.
The post Threats to the confidentiality, integrity, and availability of data appeared first on homework handlers.

Lines of defense available to network and security administrators

 
 
 
 
 
 
There are several lines of defense available to network and security administrators, including intrusion prevention and detection technologies. The activities and tools that are available to monitor and test the security levels on a modern network are varied. They range from free open source to very expensive and sophisticated technologies. They come in single-use solutions and best-of-breed solutions, which are typically suites of network management applications that perform a variety of activities.
 
In this assignment you explain various monitoring tools and methods available to network administrators.
Write 3–4 pages in which you consider the following aspects of network monitoring.
Choose a common packet inspection tool and explain how it works to mitigate threats.
Describe three criteria that a network or security administrator might use when selecting a network monitoring tool.
Describe a security policy that is designed to ensure that an organization’s information is not compromised by internal IT staff.
 
 
The post Lines of defense available to network and security administrators appeared first on homework handlers.

Companies and/or applications that protect data.

 
 
 
 
 
 
 
Take about one hour to search for companies and/or applications that protect data.
List and describe the advantages and disadvantages for in-house data security versus commercial company data security.
 
The post Companies and/or applications that protect data. appeared first on homework handlers.