Friday, February 22, 2019
Aup Definition
Unit 5 Assignment 1 scrutiny and Monitoring warrantor Controls Learning Objectives and Outcomes ?You give learn to recognize security events and service line anomalies that might indicate comic activity. ?You will learn to identify form _or_ system of government violations and security breaches and to appropriately monitor threats and control activity across the mesh topology. Assignment Requirements Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and service line anomalies. After studying the handout, answer the following questions Identify at to the lowest degree two types of security events and baseline anomalies that might indicate suspicious activity. ? prone a list of policy violations and security breaches, select three breaches, and fence the best options for controlling and monitoring each incident. Identify the methods to mitigate jeopardize and minify exposure to threats or vulnerabilities. Re quired Resources Worksheet Testing and Monitoring Security Controls Submission Requirements ?data formatting Microsoft Word ?Font Arial, Size 12, Double-Space ? length 12 pages ?Due By Unit 6 Self-Assessment Checklist I have identified at least two security events and baseline anomalies. ?I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list. ?I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities. Unit 5 Assignment 2 square off an Acceptable Use Policy (AUP) Learning Objectives and Outcomes ?You will learn to successfully identify inappropriate activity on a network and to give voice a basic AUP that describes the handling of such incidents.Assignment Requirements Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. accepted traffic is expressly forbidden ? No peer-to-peer file sharing or remotely r eachable file transfer protocol (FTP) servers ? No downloading executables from cognise software sites ?No unauthorized redistribution of licensed or copyrighted natural ? No exporting internal software or technical framework in violation of export control laws ? No introduction of vicious programs into networks or onto systems ?No accessing unauthorized internal resources or information from external sources ? No port scanning or data interception on the network ?No denying service or circumventing authentication to legitimate users ? No exploitation programs, scripts, or commands to interfere with other network users ? No sending unsolicited e-mail messages or junk mail to company recipients ? No accessing big(a) content from company resources ?No remote connections from systems failing to meet stripped-down security requirementsDefine a LAN-to-WAN, earnings, and wind vane surfing AUP that restricts usage of the companys Internet connection and permits the company to mon itor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, some(prenominal) positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate activity.Required Resources ?None Submission Requirements ?Format Microsoft Word ?Font Arial, Size 12, Double-Space ?Citation Style pelf Manual of Style ?Length 12 pages ?Due By Unit 6 Self-Assessment Checklist ?I have defined an effective LAN-to-WAN, Internet, and Web surfing AUP. ?I have evaluated the implications of each policy. ?I have carefully considered the benefits and disadvantages of each policy enforcement control. ?I have proposed strong ideas for acceptable and unacceptable resource usage.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment