Identifying an appropriate Computer Security Incident Response Team
Protecting enterprise assets is the purpose of security policy architecture. How do you obtain senior management cooperation?
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.
2.) Identifying an appropriate Computer Security Incident Response Team. How would you select the team and which responsibilities would you assign to the team in priority order.
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.
3.)
After reading Black, Scarfone, and Souppaya (2008), choose one of the cybersecurity measurement problems discussed by the authors. Explain the problem in your own words and address how and why this problem could impact a cybersecurity focused evaluation of emerging technologies or emerging applications of technologies which are intended for use in a business environment.
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.
Reference:
Black, P. E., Scarfone, K., & Souppaya, M. (2008). Cybersecurity metrics and measures. In J. G. Voller (Ed.) Handbook of science and technology for homeland security (vol. 5). Hoboken, NJ: John Wiley & Sons.
Read sections 1, 2, and 7 in Bartol, Bates, Goertzel, and Winograd (2009) before attempting to answer this question.
1. Explain in your own words the differences between metrics, measures, and measurements.
2. What types of measures will you need to collect during your proposed technology evaluation (the assignment that is due this week)?
3. How will you collect these measures? (What actions will be necessary to collect the required data?)
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.
Reference:
Bartol, N., Bates, B., Goertzel, K. M., & Winograd, T. (2009). Measuring cyber security and information assurance: A state-of-the-art report. Herndon, VA: IATAC. Retrieved from https://buildsecurityin.us-cert.gov/sites/default/files/MeasuringCybersecurityIA.PDF
Answer preview to identifying an appropriate Computer Security Incident Response Team
APA
1152 words