Essay Available:
Pages:
3 pages/β825 words
Sources:
4 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:
Information Security Continuous Monitoring - Challenges and Solutions
Essay Instructions:
I want to look at the attached instruction for the module 2 case assignment
Essay Sample Content Preview:
Information Security Continuous Monitoring - Challenges and Solutions Name: Institution: Date: Continuous monitoring of information system (IS) helps to minimize the risks that may affect the security details of the IS as well as manage effectiveness. With information security breaches, becoming more frequent it is vital to understand risk in a system, any time that system undergoes changes. Continuous monitoring of security concerns is an improvement on traditional models of monitoring but at times, there are difficulties in detecting risks when changes occur often. Other than providing security to information systems, continuous monitoring is also effective they maximize the ROI (NIST & Booz Allen Hamilton, Inc, 2011). This paper looks into the challenges and solutions in information security continuous monitoring. One of the main advantages of continuous motoring is that it complements data collection rather than replace the process (NIST, 2011). The domains that collect data are still the main repositories of data collected. Thus, implementation of continuous monitoring improves the efficiency of the system, as there is instrumentation of the collection system, which facilitates integration with continuous monitoring. Compatibility with continuous monitoring in turn helps to minimize integrations costs for future systems as well as allow implementation of various security measures than in traditional monitoring. In essence, use of continuous monitoring calls for more use of automated methods in data collection, this is better than manual collection, which requires automation of information and standardization. Numerous off the shelf automation tools are essential as they provide situational awareness. Situational awareness occurs as they provide understanding of the security situation in information systems through continued monitoring IT infrastructure and systems (DHS, 2011). Essentially, monitoring security flaws looks into vulnerab...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
π Other Visitors are Viewing These APA Essay Samples:
- Nano Batteries for Electric Cars9 pages/β2475 words | 5 Sources | APA | Technology | Essay |
- Summary of an Article on Energy Security1 page/β275 words | 1 Source | APA | Technology | Essay |
- Technology Auditing4 pages/β1100 words | 3 Sources | APA | Technology | Essay |
- Cloud Computing and IT Services4 pages/β1100 words | 3 Sources | APA | Technology | Essay |
- Research Google's attempt to buy into wireless 2 pages/β550 words | 3 Sources | APA | Technology | Essay |
- HOME NETWORK TUTORIAL2 pages/β550 words | 2 Sources | APA | Technology | Essay |
- Challenges and Solution to Build Proper Security Beliefs/Culture/Awareness in ______ (the in. . .2 pages/β550 words | 1 Source | APA | Technology | Essay |