Choose an enterprise that operates a global data network


IT Security Risks and Anomaly Detection

Part A: Choose an enterprise that operates a global data network. Analyze the various types of risk confronting the enterprise. Then, a report for potential investors that includes the following:

  • An overview of the organization, its industry, its mission, and its core business processes.
  • A risk matrix that quantifies the risks to enterprise network operations.
  • An analysis of the risks and threats to the enterprise network that you identified.
  • An analysis of risk controls to mitigate identified risks.
  • Specific recommendations for the implementation of risk controls that are appropriate for mitigating the risks you identified.
  • An explanation of the optimal risk assessment methodology for the enterprise IT network situation.

Part B: Choose an enterprise that operates a global data network. Analyze various types of potential security events, and a report for an executive management team that includes the following information:

  • Explain how anomalies in network traffic or usage may indicate a security event.
  • Explain how log files can be used to determine the legitimacy of anomalous traffic.
  • Identify and describe three specific security events that may cause anomalous traffic.
  • Describe security controls and specific defense mechanisms to mitigate these security events.
  • Provide validation and support for arguments and your ideas by citing relevant examples and supporting evidence.

Solution Preview :

Prepared by a verified Expert
Business Management: Choose an enterprise that operates a global data network
Reference No:- TGS02787237

Now Priced at $20 (50% Discount)

Recommended (95%)

Rated (4.7/5)