CYB:407-WK4-TEAM-ASSESSMENT
.docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
407
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by lejb1288
CYB/407 WK4 - TEAM-ASSESSMENT&MOMITORINGTOOLS Assignment Content You have become familiar with the HSR Toolkit to track progress on the selected security controls in order to assist with conducting a risk assessment. After the risk assessment is conducted and documented in a Security Assessment Report (SAR), the implemented security controls must be monitored. Research the various adm..vero1o%P 2 |s (HSR Toolkit is one) and technical security monitoring tools (i.e., code scanners, vulnerability scanners, etc.) that help validate the effectiveness of implemented security controls. Develop, with your Learning Team, a 1-page listing using Microsoft® Word of at least two administrative and technical tools that are available to support control monitoring. The listing should include: A description of each tool An explanation of how each tool assists with measuring control effectiveness and mitigating risks Administrative Control Tools: HSR Toolkit: The HIPAA Security Rule (HSR) Toolkit application helps organizations understand the requirements of HIPAA by providing them with a method to assess their security controls and ensure they align with HIPAA. This assists with measuring control effectiveness by giving organizations a chance to directly assess the many different areas of the HIPAA security rule via questions and helps to mitigate risks by ensuring the HIPAA security rule is properly implemented.
Tool2: T Technical Control Tools: Technical Tool: Code Scanner (Static Application Security Testing) Description: This technical tool provides real-time responses to the developers while they are coding. This gives them the opportunity to solve certain problems before proceeding to the next phases of the SDLC. Explanation: This tool can help analysis and seek out flaws within the source’s coding. Every flaw that has been flagged needs to be reported to the coders on the deployment teams so they can be rectified and to further assess if these are real flaws or false positives. These tools can be used in conjunction with other software and repeated over and over again. Lastly, the code scanner can sort all flaws by location, filename, line number, and can even show the flawed code fragments. This allows for the developers to find the flawed code quickly. Tool 2: Vulnerability Scanners Description: An automated tool that identifies devices and software among them and continuously scans to determine weaknesses or faults that may allow access by software or intruders. Explanation: These automated scanners are installed into a system and are designed and designated to regularly scan previously and newly installed software and systems for possible entry points and vulnerabilities. Due to the constant progression and evolution of software and technology as a whole, threats of attack or intrusion are climbing each day. By implementing a warden application such as these scanners, a defensive system is constantly watching for changes or discrepancies of any kind to alert monitoring teams to take action.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
- A policy conundrum
Your organization has the following statements regarding phishing/social engineering in the employee manual:
All employees are required to complete annual security awareness training as provided by the Information Security team. Employees must successfully complete the training and achieve an established minimum score on any quizzes associated with the training.
The organization will conduct routine evaluations of the effectiveness security awareness training through simulated phishing tests. Employees that incorrectly identify simulated phishing emails must complete additional security awareness training and their manager will be notified. If an employee incorrectly identifies 3 or more simulated phishing emails, additional action may be taken by the employee’s manager, up to and including termination.
Employees are required to report any suspicious emails to the organization’s Information Security team using the Suspicious Mail button located in the…
arrow_forward
Group Policy Protections [NG]
Author: Malcolm Reed Jr.Framework Category: Operate and MaintainSpecialty Area: Systems AnalysisWork Role: Systems Security AnalystTask Description: Verify minimum security requirements are in place for all applications. (T0508)Scenario
After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy.
Additional Information
More details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge.You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge.Once you have completed the requested tasks, you will need to document the…
arrow_forward
Homework 5 - Write the Security plan for the software that implements on-line auction system
Guidelines:
The security plan should outline the authentication and authorization, and privacy
requirements for the software
The known threats to the system should be described along with a plan for managing
each threat.
arrow_forward
Certified information system security professional (CISSP)
(150 Words)
OSSTMM professional security Tester (OPST) (150 Words)
Write a paragraph on these topic without plagrisum
arrow_forward
Acceptable Use Policy (AUP)
Bring Your Own Device (BYOD)
Password Policy
Risk Management (RM)
Security Awareness Policy
Security Enforcement Policy
Authorization and Authentication Policies
Many various types of governance policies (formal and informal)
Select a minimum of three to four components from the list above.
Explain why you would use your selected components in an application security policy.
Justify your explanations with support from appropriate application security principles and standards.
Describe how your selected components would be incorporated into a security policy of an
organization you currently work for, or any organization of your choice. In your description, include
the following:
Determine the network security mechanisms you will use to secure your organization's network.
Give examples of securing data using cryptographic algorithms.
Describe various programming techniques as it applies to securing data.
Devise a plan for mitigating a disaster recovery.
Devise…
arrow_forward
Physical Security Survey
In this project you will perform a survey of the physical security at your school or workplace.
Identify vulnerabilities in the design and use of the following aspects of the facility:
Use of locking doors at main entrances
Access to sensitive areas
Cabling, communications, or computing equipment readily accessible
Video surveillance
Personnel badges
Loading area
Fire suppression
Make a list of issues you found. Include a categorization of risk and a suggested remedy to reduce the risk.
Do not enter any “employee only” areas during this exercise unless you have obtained permission in advance or are escorted by authorized personnel
arrow_forward
Explain which "technique" can be used to provide secure authentication and authorization for the following scenario. Scenario: A company is developing a web application that allows users to sign in with their social media accounts and post updates to those accounts. The company wants to ensure that user data is kept secure and protected, and that users are only authorized to access their own accounts. In your answer, address the following points: 1) Explain the basics of the technique and how it can be used for authentication and authorization. 2) Describe how the technique could be implemented in this scenario to authenticate users and authorize access to their social media accounts. 3) Explain the benefits of using the technique in this scenario. 4) Discuss any potential drawbacks or limitations of using the technique in this scenario.
arrow_forward
Top-down security is better than bottom-up security.
arrow_forward
Step-By-Step Assignment Instructions
Assignment Topic:
How data breaches occur and are discovered.
Setup instructions:
Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches.
Then pick 3 different types of data breaches and report on one data breach each. The types are located on the left hand side.
How to submit:
Submit a summary of each data breach and answer the following questions in your response:
What was the data breach?
How was the data breach found out?
What were the threats?
What were the vulnerabilities and how did the threats interact with them?
Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach?
Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page. In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.
arrow_forward
A security policy defines how a particular control will be implemented.
True
O False
arrow_forward
y using a free software application, list the steps for password cracking an Iot Device for vulnerability analysis project. Has to be actual demonstration. No hand written solution and no image
arrow_forward
Bottom-up security is inferior than top-down security.
arrow_forward
Explain system support and security steps.
arrow_forward
Explain Vulnerability testing and identify tools used for vulnerability testing.
arrow_forward
Launch versions of operating systems and apps often include bugs. Multiple thousands of bugs have been found in popular application frameworks. When a problem is found in a piece of software, the manufacturer usually has a patch available for sale (also known as patches). The day after a new vulnerability is disclosed, criminals launch zero-day assaults. No one disputes the immorality of these criminals' actions, but what responsibility does a software firm have if its ineptitude or haste to market endangers its customers? Security fixes should be installed on a regular basis.
arrow_forward
All of the following statements are true in regards to clipping levels except for which one?
Activity below a clipping level is considered normal and expected
When the clipping level is exceeded, a violation record may be recorded
All abnormal activity, including intrusions, will cross a clipping level
The use of clipping levels is considered a preventative technical access control method
arrow_forward
Font
Paragraph
Styles
Example-3
A company sells product via website. Website earns $ 5000 an hour in revenue.
When an attack happens, website normally fails for three hours, Cost to repair is
$1000.It was seen that in the previous years, website was down for at least 4 times
a year. Calculate SLE, ARO, ALE for the above data,
The company wishes to purchase a fail over server to reduce this problem and the
cost of implementing it is $15000. If ARO can be reduced to 1 by implementing
fail over server, do you think that it is a feasible option?
12
arrow_forward
PLZ help with the following:
arrow_forward
As soon as possible!
arrow_forward
Please describe the difference between an assault and a threat.
arrow_forward
Which dimension(s) of security is spoofing a threat to?A) integrityB) availabilityC) integrity and authenticityD) availability and integrity
arrow_forward
Briefly explain the role of a moderator in the software inspection.
arrow_forward
Define the terms integrity and permission limitations.
arrow_forward
Which of these is a security goal in IoT systems?a) Confidentialityb) Snoopingc) Monitoringd) Control management
arrow_forward
Security that operates from the top down as opposed to the
bottom up: What are the advantages of acting in this manner?
arrow_forward
Explain how the use of safety integrity levels (SIL) helps classify and manage software safety risks.
arrow_forward
Explain Systems/Applications with Open Vulnerabilities.
arrow_forward
Failure” in program security. Explain types of each term
arrow_forward
Task (Individual)
ATM
• A customer must be able to access his account using any ATM machine, valid card and correct pin code
• A customer must be able to Change Pin-Code
• A customer must be able to Check balance
• A customer must be able to Withdraw
• A customer must be able to Print balance report
• A customer must be able to abort a transaction in progress by pressing the Exit key instead of
responding to a request from the machine.
• A customer must be able to make a deposit to any account linked to the card
• A customer must be able to make a transfer of money between any two accounts linked to the card.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- - A policy conundrum Your organization has the following statements regarding phishing/social engineering in the employee manual: All employees are required to complete annual security awareness training as provided by the Information Security team. Employees must successfully complete the training and achieve an established minimum score on any quizzes associated with the training. The organization will conduct routine evaluations of the effectiveness security awareness training through simulated phishing tests. Employees that incorrectly identify simulated phishing emails must complete additional security awareness training and their manager will be notified. If an employee incorrectly identifies 3 or more simulated phishing emails, additional action may be taken by the employee’s manager, up to and including termination. Employees are required to report any suspicious emails to the organization’s Information Security team using the Suspicious Mail button located in the…arrow_forwardGroup Policy Protections [NG] Author: Malcolm Reed Jr.Framework Category: Operate and MaintainSpecialty Area: Systems AnalysisWork Role: Systems Security AnalystTask Description: Verify minimum security requirements are in place for all applications. (T0508)Scenario After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy. Additional Information More details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge.You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge.Once you have completed the requested tasks, you will need to document the…arrow_forwardHomework 5 - Write the Security plan for the software that implements on-line auction system Guidelines: The security plan should outline the authentication and authorization, and privacy requirements for the software The known threats to the system should be described along with a plan for managing each threat.arrow_forward
- Certified information system security professional (CISSP) (150 Words) OSSTMM professional security Tester (OPST) (150 Words) Write a paragraph on these topic without plagrisumarrow_forwardAcceptable Use Policy (AUP) Bring Your Own Device (BYOD) Password Policy Risk Management (RM) Security Awareness Policy Security Enforcement Policy Authorization and Authentication Policies Many various types of governance policies (formal and informal) Select a minimum of three to four components from the list above. Explain why you would use your selected components in an application security policy. Justify your explanations with support from appropriate application security principles and standards. Describe how your selected components would be incorporated into a security policy of an organization you currently work for, or any organization of your choice. In your description, include the following: Determine the network security mechanisms you will use to secure your organization's network. Give examples of securing data using cryptographic algorithms. Describe various programming techniques as it applies to securing data. Devise a plan for mitigating a disaster recovery. Devise…arrow_forwardPhysical Security Survey In this project you will perform a survey of the physical security at your school or workplace. Identify vulnerabilities in the design and use of the following aspects of the facility: Use of locking doors at main entrances Access to sensitive areas Cabling, communications, or computing equipment readily accessible Video surveillance Personnel badges Loading area Fire suppression Make a list of issues you found. Include a categorization of risk and a suggested remedy to reduce the risk. Do not enter any “employee only” areas during this exercise unless you have obtained permission in advance or are escorted by authorized personnelarrow_forward
- Explain which "technique" can be used to provide secure authentication and authorization for the following scenario. Scenario: A company is developing a web application that allows users to sign in with their social media accounts and post updates to those accounts. The company wants to ensure that user data is kept secure and protected, and that users are only authorized to access their own accounts. In your answer, address the following points: 1) Explain the basics of the technique and how it can be used for authentication and authorization. 2) Describe how the technique could be implemented in this scenario to authenticate users and authorize access to their social media accounts. 3) Explain the benefits of using the technique in this scenario. 4) Discuss any potential drawbacks or limitations of using the technique in this scenario.arrow_forwardTop-down security is better than bottom-up security.arrow_forwardStep-By-Step Assignment Instructions Assignment Topic: How data breaches occur and are discovered. Setup instructions: Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches. Then pick 3 different types of data breaches and report on one data breach each. The types are located on the left hand side. How to submit: Submit a summary of each data breach and answer the following questions in your response: What was the data breach? How was the data breach found out? What were the threats? What were the vulnerabilities and how did the threats interact with them? Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach? Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page. In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.arrow_forward
- A security policy defines how a particular control will be implemented. True O Falsearrow_forwardy using a free software application, list the steps for password cracking an Iot Device for vulnerability analysis project. Has to be actual demonstration. No hand written solution and no imagearrow_forwardBottom-up security is inferior than top-down security.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage