CYB:407-WK4-TEAM-ASSESSMENT

.docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

407

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by lejb1288

Report
CYB/407 WK4 - TEAM-ASSESSMENT&MOMITORINGTOOLS Assignment Content You have become familiar with the HSR Toolkit to track progress on the selected security controls in order to assist with conducting a risk assessment. After the risk assessment is conducted and documented in a Security Assessment Report (SAR), the implemented security controls must be monitored. Research the various adm..vero1o%P 2 |s (HSR Toolkit is one) and technical security monitoring tools (i.e., code scanners, vulnerability scanners, etc.) that help validate the effectiveness of implemented security controls. Develop, with your Learning Team, a 1-page listing using Microsoft® Word of at least two administrative and technical tools that are available to support control monitoring. The listing should include: A description of each tool An explanation of how each tool assists with measuring control effectiveness and mitigating risks Administrative Control Tools: HSR Toolkit: The HIPAA Security Rule (HSR) Toolkit application helps organizations understand the requirements of HIPAA by providing them with a method to assess their security controls and ensure they align with HIPAA. This assists with measuring control effectiveness by giving organizations a chance to directly assess the many different areas of the HIPAA security rule via questions and helps to mitigate risks by ensuring the HIPAA security rule is properly implemented.
Tool2: T Technical Control Tools: Technical Tool: Code Scanner (Static Application Security Testing) Description: This technical tool provides real-time responses to the developers while they are coding. This gives them the opportunity to solve certain problems before proceeding to the next phases of the SDLC. Explanation: This tool can help analysis and seek out flaws within the source’s coding. Every flaw that has been flagged needs to be reported to the coders on the deployment teams so they can be rectified and to further assess if these are real flaws or false positives. These tools can be used in conjunction with other software and repeated over and over again. Lastly, the code scanner can sort all flaws by location, filename, line number, and can even show the flawed code fragments. This allows for the developers to find the flawed code quickly. Tool 2: Vulnerability Scanners Description: An automated tool that identifies devices and software among them and continuously scans to determine weaknesses or faults that may allow access by software or intruders. Explanation: These automated scanners are installed into a system and are designed and designated to regularly scan previously and newly installed software and systems for possible entry points and vulnerabilities. Due to the constant progression and evolution of software and technology as a whole, threats of attack or intrusion are climbing each day. By implementing a warden application such as these scanners, a defensive system is constantly watching for changes or discrepancies of any kind to alert monitoring teams to take action.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help