ISSC 421 AMU Security and Automation Programs Discussion

User Generated

ee11

Programming

ISSC 421

American Military University

ISSC

Description

Scenario:

Two more weeks have passed and your CISO is excited about implementing the new controls and solutions that you’ve recommended. Your detailed analysis of the operational environment and alignment of security solutions to the business mission and goals was spot on!

You have gained confidence in the CISO and board of directors, and they’ve identified additional funding that may be applied towards security. You have asked to implement Security Automation (read about it here). Then review these additional readings as well:

"The Second Wave": IS automation - https://www.isaca.org/Journal/archives/2010/Volume-6/Pages/Information-Security-Automation-The-Second-Wave.aspx if that link does not work try this one: https://web.archive.org/web/20160921213850/http://www.isaca.org/Journal/archives/2010/Volume-6/Pages/Information-Security-Automation-The-Second-Wave.aspx

Learn about Intrusion Detection and Prevention: Quick read on IDS/IPS systems - https://www.juniper.net/documentation/en_US/learn-about/LA_IntrusionDetectionandPrevention.pdf

minimum 250 words

You will:

  1. Briefly list and explain two strengths of one of the technologies discussed in "The Second Wave" reading.
  2. Explain how a properly configured IDS/IPS system can feed into your overall security plans.
  3. Explain how the use of an IDS/IPS system can fit into the security automation process.

Explanation & Answer:
250 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

goodbye for now

Running head: Issc421 forum

SECURITY AND AUTOMATION PROGRAMS
Name
Institutional affiliation

2

issc421 forum
Advantages of information security and automation programs include;
1. They allow for easy configuration, which is automatic. In the security system, one can
quickly get to log in the details for verification, meaning that it cannot deny the members
access to information. This security system can quickly detect fraud since the details to
be used must rhyme wi...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags