Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Overview Security analysts play an important role working alongside the computer incident response team ( CIRT ) . The analyst will be the individual who

Overview
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security (CIS) critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization toward compliance. They are not meant to be used in isolation. Comparing an organizations technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders.
Prompt
After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below:
Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders).
Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use.
Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified by policy, implementation, automation, or reporting to enhance security for the organization.
Subcontrol One: Describe the modification of the subcontrol and justify your recommendation.
Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation.
Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication.
Discuss the merits of using RSA encryption and the implementation of two-factor authentication.
Discuss how different forms of encryption may be used in VPN software.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions