How can audits identify cyber threats


Assignment:

Primary Task Response: Within the Discussion Board area, write 600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

You are attending a weekly workgroup meeting at a local library that hosts a cybersecurity weekly forum for industry apprentices and experts to discuss topics in cybersecurity. The topic this week is to communicate methods for identifying and detecting cyber threats in a business environment. Areas that you should research and be prepared to articulate at the cyber forum may include the following:

• Define defense in depth and the benefits this offers to the security of ICT systems.

• How is a layered security approach that offers intrusion prevention or intrusion detection effective at protecting against cybersecurity threats?

• How can audits identify cyber threats? What does an audit program seek to accomplish?

• What is the biggest threat to enterprise information and communication technology (ICT) systems? Use statistics from reliable publications.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response. To help you with your discussion, please consider the following questions:

• What did you learn from your classmate's posting?

• What additional questions do you have after reading the posting?

• What clarification do you need regarding the posting?

• What differences or similarities do you see between your posting and other classmates' postings?

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

Reading Materials

• This article discusses defense in-depth as a strategy to preserve ICT systems. Click here to read the article.

• This article conveys recommendations for more secure IDS/IPS that aim to increase not only the security of the system itself, but the company's security posture as a whole. Click on this link to view the article.

• This article discusses the corporate responsibility of audits and controls. Click on this link to learn more.

• Forty seven data security experts compare the risks of insider threats versus outsider threats in this in-depth discussion of data threats. Click here to read the article.

• Expert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Click on this link to view the article.

• The spirit of cooperation seems to be taking hold, as demonstrated by the growing number of thriving services and organizations whose sole purpose is to analyze specific threats against specific communities. Click here to learn more about threat intelligence sharing.

Assignment Objectives

• Evaluate cybersecurity best practices within business organizations

• Evaluate the purpose, importance, and primary content of Security Policies, Security Standards, Security Procedures, and Security Awareness within an organization

• Examine cybersecurity from a technical and managerial perspective

• Outline the application of techniques for identifying, detecting, and defending against cybersecurity threats within a business environment.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: How can audits identify cyber threats
Reference No:- TGS02990981

Now Priced at $30 (50% Discount)

Recommended (99%)

Rated (4.3/5)