IT Security Risks and Anomaly Detection
Part A: Choose an enterprise that operates a global data network. Analyze the various types of risk confronting the enterprise. Then, a report for potential investors that includes the following:
- An overview of the organization, its industry, its mission, and its core business processes.
- A risk matrix that quantifies the risks to enterprise network operations.
- An analysis of the risks and threats to the enterprise network that you identified.
- An analysis of risk controls to mitigate identified risks.
- Specific recommendations for the implementation of risk controls that are appropriate for mitigating the risks you identified.
- An explanation of the optimal risk assessment methodology for the enterprise IT network situation.
Part B: Choose an enterprise that operates a global data network. Analyze various types of potential security events, and a report for an executive management team that includes the following information:
- Explain how anomalies in network traffic or usage may indicate a security event.
- Explain how log files can be used to determine the legitimacy of anomalous traffic.
- Identify and describe three specific security events that may cause anomalous traffic.
- Describe security controls and specific defense mechanisms to mitigate these security events.
- Provide validation and support for arguments and your ideas by citing relevant examples and supporting evidence.