Sign In
Not register? Register Now!
Essay Available:
Pages:
2 pages/≈550 words
Sources:
2 Sources
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Continuous Monitoring For Client Information Access at ABC Company: Challenges and Solutions - module 2 SLP (Essay Sample)

Instructions:
Please look at the attached word document assignment instructions for module 2 SLP source..
Content:
Continuous Monitoring For Client Information Access at ABC Company: Challenges and Solutions Name of students Name of institution Name of instructor Course Date due Continuous Monitoring For Client Information Access at ABC Company: Challenges and Solutions Definition of the Strategy The continuous monitoring at ABC Company is very critical for the smooth running of administrative and technical aspects of the company. Borrowing from the definition of continuous monitoring available at NIST SP 800-137, we start this task by defining the strategy. (Dempsey, K. et al, 2011) ABC Company intends to monitor the status of authorized and unauthorized access to customer information. This is a very important step because the company wants to make sure that the integrity and confidentiality of information is maintained at all times. The purpose of this strategy is to identify and prevent unauthorized access because this might cause inconvenience to clients. Establish Measures and Metrics ABC Company wants to check the status of clients’ information access by both authorized and unauthorized personnel. A simple definition of the metric in this case is the percentage of unauthorized access to the network on a daily basis. To support this metric, ABC will use logical asset locations, specifically IP addresses. Response with Mitigation Actions To deal with the problem of unauthorized access to customer information, ABC Company may apply several plans. Firstly, the potential external and internal threats are identified. These are threats that could result in destruction, misuse or disclosure of information without authorization. Once the threats are identified, and with full consideration of level of sensitive of clients’ information, an assessment of likely damage of the threats is...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Information Security Continuous Monitoring - Challenges and Solutions
    Description: Undergraduate writing level 3 pages Technology Format Style English (U.S.) Essay. Module 2 case assignment: Information Security Continuous Monitoring - Challenges and Solutions...
    3 pages/≈825 words | 4 Sources | APA | Technology | Essay |
  • Telecommunication and Network Security
    Description: Undergraduate writing level 2 pages Technology Format Style English (U.S.) Essay. Telecommunication and Network Security...
    2 pages/≈550 words | 2 Sources | APA | Technology | Essay |
  • Risk Management for Information System Security
    Description: Undergraduate writing level 3 pages Technology Format Style English (U.S.) Essay. Risk Management for Information System Security...
    3 pages/≈825 words | 3 Sources | APA | Technology | Essay |
Need a Plagiarism Free Essay?
Submit your instructions!