3 pages/≈825 words
Information Security Continuous Monitoring - Challenges and Solutions (Essay Sample)
I want to look at the attached instruction for the module 2 case assignment source..
Information Security Continuous Monitoring - Challenges and Solutions Name: Institution: Date: Continuous monitoring of information system (IS) helps to minimize the risks that may affect the security details of the IS as well as manage effectiveness. With information security breaches, becoming more frequent it is vital to understand risk in a system, any time that system undergoes changes. Continuous monitoring of security concerns is an improvement on traditional models of monitoring but at times, there are difficulties in detecting risks when changes occur often. Other than providing security to information systems, continuous monitoring is also effective they maximize the ROI (NIST & Booz Allen Hamilton, Inc, 2011). This paper looks into the challenges and solutions in information security continuous monitoring. One of the main advantages of continuous motoring is that it complements data collection rather than replace the process (NIST, 2011). The domains that collect data are still the main repositories of data collected. Thus, implementation of continuous monitoring improves the efficiency of the system, as there is instrumentation of the collection system, which facilitates integration with continuous monitoring. Compatibility with continuous monitoring in turn helps to minimize integrations costs for future systems as well as allow implementation of various security measures than in traditional monitoring. In essence, use of continuous monitoring calls for more use of automated methods in data collection, this is better than manual collection, which requires automation of information and standardization. Numerous off the shelf automation tools are essential as they provide situational awareness. Situational awareness occurs as they provide understanding of the security situation in information systems through continued monitoring IT infrastructure and systems (DHS, 2011). Essentially, monitoring security flaws looks into vulnerab...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Telecommunication and Network SecurityDescription: Undergraduate writing level 2 pages Technology Format Style English (U.S.) Essay. Telecommunication and Network Security...2 pages/≈550 words | 2 Sources | APA | Technology | Essay |
- Risk Management for Information System SecurityDescription: Undergraduate writing level 3 pages Technology Format Style English (U.S.) Essay. Risk Management for Information System Security...3 pages/≈825 words | 3 Sources | APA | Technology | Essay |
- Advising About a Software PurchaseDescription: Master writing level 1 page Technology Format Style English (U.S.) Essay. Advising About a Software Purchase...1 page/≈275 words | 2 Sources | APA | Technology | Essay |