Question
1) a) What is the role of a cyber security analyst, the different tiers, and the difference in job roles and responsibilities for each tier.
1)
a) What is the role of a cyber security analyst, the different tiers, and the difference in job roles and responsibilities for each tier. If there's an experience or other requirements that distinguishes the two, please list that as part of your description.
b) Explain what you do in your day-to-day job. What tools do you use to identify malice on the networks? What process do you undertake if you have identified something that looks suspicious? What other business operations components do you interact with and in what capacity? c) Given that you've read Symantec's report, what techniques, methods, or rules would you employ to discover adversaries such as the ones described attempting to or who have acquired access to the network? Note: posting "use the Symantec/vendor recommended product recommend will result in a 0 for this question. d) I realize this is unrelated to the above, but explain the relationship between processes, threads, handles, sockets, and system services. Why are these important to us as cyber security professionals?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started