Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Overview Security analysts play an important role working alongside the computer incident response team ( CIRT ) . The analyst will be the individual who
Overview
Security analysts play an important role working alongside the computer incident response team CIRT The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security CIS critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization toward compliance. They are not meant to be used in isolation. Comparing an organizations technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders.
Prompt
After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below:
Reporting: Select an audience for reporting sales team, senior management, or other stakeholders
Explain how you report technical concerns to nontechnical people in your selected audience. Keep in mind that most managerial roles are nontechnical in nature; managers need information presented to them in a format they can easily understand and use.
Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified by policy, implementation, automation, or reporting to enhance security for the organization.
Subcontrol One: Describe the modification of the subcontrol and justify your recommendation.
Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation.
TwoFactor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of twofactor authentication.
Discuss the merits of using RSA encryption and the implementation of twofactor authentication.
Discuss how different forms of encryption may be used in VPN software.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started