Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
2 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Continuous Monitoring For Client Information Access at ABC Company: Challenges and Solutions - module 2 SLP

Essay Instructions:
Please look at the attached word document assignment instructions for module 2 SLP
Essay Sample Content Preview:
Continuous Monitoring For Client Information Access at ABC Company: Challenges and Solutions Name of students Name of institution Name of instructor Course Date due Continuous Monitoring For Client Information Access at ABC Company: Challenges and Solutions Definition of the Strategy The continuous monitoring at ABC Company is very critical for the smooth running of administrative and technical aspects of the company. Borrowing from the definition of continuous monitoring available at NIST SP 800-137, we start this task by defining the strategy. (Dempsey, K. et al, 2011) ABC Company intends to monitor the status of authorized and unauthorized access to customer information. This is a very important step because the company wants to make sure that the integrity and confidentiality of information is maintained at all times. The purpose of this strategy is to identify and prevent unauthorized access because this might cause inconvenience to clients. Establish Measures and Metrics ABC Company wants to check the status of clients’ information access by both authorized and unauthorized personnel. A simple definition of the metric in this case is the percentage of unauthorized access to the network on a daily basis. To support this metric, ABC will use logical asset locations, specifically IP addresses. Response with Mitigation Actions To deal with the problem of unauthorized access to customer information, ABC Company may apply several plans. Firstly, the potential external and internal threats are identified. These are threats that could result in destruction, misuse or disclosure of information without authorization. Once the threats are identified, and with full consideration of level of sensitive of clients’ information, an assessment of likely damage of the threats is conducted. With such information, it becomes easier to mitigate the threat to client information at ABC Company. Management at ABC Company will take a number of remedial steps to deal with this threat. An important action in ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!