Unit 1 Ind Pro 2 Assessment 1

    Unit 1 Ind Pro 2 Assessment
    Your company wishes to ensure that if and when an intrusion happens they can detect it and determine the extent. You have been asked to write a white paper that describes the importance of collecting audit data and the importance of reviewing that data.
    This first assignment will allow you to establish The Key Assignment Template that will be used throughout the class for all Individual Project submissions and to explore the framework securing an organizations data. You will:
    Create the template to be used for the submission of all Individual Project Assignments
    Describe what audit data is and how it is used.
    In the framework of the network and servers what devices should audit data be collected and where it should be stored.
    Describe a process or policy for how and when audit data should be reviewed.
    Also take this opportunity to discuss the security of audit data meaning just because data is collected and reviewed does this mean it is secure and accurate.
    The template document should follow this format:
    Vulnerability Assessment Project Document Shell
    Use Microsoft Word
    Title Page
    o Course number and name
    o Project name
    o Student name
    o Date
    Table of Contents
    o Use auto-generated TOC.
    o Separate page
    o Maximum of three levels deep
    o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
    Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)
    o Intrusion Tools and Techniques
    o Common Vulnerabilities and Exposures
    o Attack Methods
    o Intrusion Detection System Policies
    o Protective Measures
    Each Week you will add to this document and submit for grading as a preview each Section will contain the following:
    Intrusion Tools and Techniques (Week 1 IP)
    o Intrusion Detection
    o Auditing
    o Audit Data Review
    Common Vulnerabilities and Exposures (Week 2 IP)
    o Definition of CVE
    o Calculation of CVSS
    o The use of the NVD
    Attack Methods (Week 3 IP)
    o A discussion about various attack mechanisms and vectors including:
    Authenticated and Unauthenticated
    Active and Passive
    Intrusion Detection System Policies (Week 4 IP)
    o Policies
    Protective Measures (Week 5 IP)
    o Vulnerability Assessment
    Add the discussion about auditing to the section titled:Intrusion Tools and Techniques.
    Name the document CSS300__IP1.doc.

                                                                                                                                      Order Now