11 Oct security monitoring
Question: 1
The position that I would staff in a SOC include maintenance of the security monitoring tools and investigation of suspicious activities. These will ensure that the system is effectively secured. Tool will be updated on a regular basis. These will be duties of security engineer (Stern, 2017). The tools to be deployed in the SOC include intrusion prevention and detection systems to help in analyzing network traffic for any presence of signatures that may be similar to known cyberattacks. The second tool is Endpoint Protection Systems to protect the enterprise endpoints in the network in case it is accessed through remote devices like laptops or other wireless device. The third too is firewall which is necessary to block unwanted traffics and whitelist only the specific ports and hosts needed (Arimatsu, Yano & Takahashi, 2018). The incident response plan (IRP) to be implemented for when a breach occurs will include the scope of the activities, the steps needed for the responses, the application of security tools, and an intrusion checklist and documentation for the lesson learnt.
References
Stern, A. (2017).Understanding the SOC Team Roles And Responsibilities. Retrieved from https://www.siemplify.co/blog/understanding-the-soc-team-roles-and-responsibilities/
Answer:
I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion.
Question:2
A security operations center (SOC) is a very important department in any organization. A security operations center at the New York Stock Exchange is very crucial especially in ensuring there is enough cybersecurity. There are different positions that I would staff in a security operations center and one of them is a security analyst whose role is to detect threats, investigate them, and respond to them on time. The other staff to incorporate is the security engineer who is responsible for maintaining tools, updating systems and recommending new tools to be used in security (Amos, 2017). The security manager is another staff who is in charge of every operation concerning the security of the New York Stock Exchange. The chief information security officer is another staff whose responsibility is to define and outline the New York Stock Exchange security operations.
There are different tools I would deploy in the SOC which include asset discovery which is used in capturing accurate real-time data in the company’s premises and cloud environment. Vulnerability assessment is another tool that helps in detecting tiny cracks that attackers use to infiltrate critical systems of the company. The behavioral monitoring tool is another SOC tool that is necessary for showing activities that rare exception to the norm (Amy, 2019). The response plan (IRP) that I would implement when a breach occurs includes seven stages. The first one is the preparation that is being prepared for the worst. The next stage is identifying the actual incident and the next stage is containing the problem. After that, an investigation is done to understand what happened to the system. The next step is eradicating the issue and later recovery is done where the company gets back to normal and lastly a follow-up is done where some questions are answered to ensure the process is enough and effective.
Answer:
I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
