Network Security Project 2 – Tools for 20 Critical Controls

 Network Security

Project 2 – Tools for 20 Critical Controls

Successful deployment of the 20 Critical Controls will require a sophisticated suite of automated tools to support timely operations. This project is designed for you to survey the available tools and evaluate the tools ability to perform.

Survey of Tools

For each control Identify the features and requirement for automated tool

Find a commercial product that supports this requirement

Describe the operation of the tool

Demonstrate the operation of the tool if possible

Download and experiment with the tool if possible

B Integration of tools

1.Identify where in your network architecture these tool would be configured

Identify an operational schedule for use of this tool and management of results, alarms, etc

What set of tools can be bundled together? Identify such tool sets

Report your work

Summary of your work

Gaps in tools needed to support the 20 Critical Control

Overall analysis and conclusions

Grading (Team Project)

Demonstrates Understanding of the 20 Critical Controls 50%

Sound Approach to the Project 20%

Sound Results 20%

Quality of the analysis and presentation 10%

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

1- Attachment is a clinically relevant concept in adulthood. It

 1- Attachment is a clinically relevant concept in adulthood. It can be measured in a number of ways. Attachment theory may afford valuable insight into the developmental trajectories of at least some common psychiatric disorders. Although most research has focused on depressive disorder, the anxiety, eating and personality disorders may

Discuss importance of the four elements in Ancona et al.’s

 Integrative Analysis #3 The purpose of the integrative analysis assignments in this course are to extend your critical thinking abilities within the topics that we have covered as part of this course and to fulfill the University’s Tier-II writing requirements for management-related majors and minors. Each integrative assignment is intended

The last 100 years of European history.

Analyze the last 100 years of European history, explaining how Europe (and in many respects, the world itself) has turned out like it has in our current day. This is not some random, sprawling essay, no matter how it appears to you, nor is it merely a chronology of events.

****REPLY TO EACH POST MIN 100 WORDS EACH**** 1. In

****REPLY TO EACH POST MIN 100 WORDS EACH**** 1.  In this week’s forum it discusses two pathways to terrorism explained by Professor Mohammed Hafez at a Congressional Forum on Islam. The first process that is most visible is the top-down process. Hafez describes that this process is utilized by centralized

This discussion thread covers Joel Mokyr’s book “A Culture of

This discussion thread covers Joel Mokyr’s book “A Culture of Growth.” After you read the book, and watch the presentation videos, you are expected to (1) post an original comment addressing one of the prompts below and (2) comment on one other student’s existing post on the topic. In doing

Lewin’s 3 stage change model

Description Chapter 2 (literature review) before, and I received it last year but I have to add information about the following theories and its implications, criticism and limitation : 1) Technology Acceptance Model 2 (TAM2). 2) ADKAR Model. 3) Lewin’s 3 stage change model. 4) The Theory of Reasoned Action

State_Capitals Physical Database Create primary and secondary keys for the

  State_Capitals Physical Database Create primary and secondary keys for the attached unfinished physical database design. Ensure your submission addresses each of these components: Introduction: Explain the process to create a physical database. Body: The attached DDL statements are used to create the physical database “State_Capitals” that consists of four tables:

Provide evidence to support the claim that health is not

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Article The grounded theory looks to analyze how people understand

   Article The grounded theory looks to analyze how people understand and interact with other people in their world and interpret the socially shared meanings which influence human behaviors. In practice, nurses can use grounded theory to assess health patterns in population groups and communities and predict health patterns and

Various types of direct marketing were discussed in the reading.

  Various types of direct marketing were discussed in the reading.  In your opinion, which of these types is the most effective at reaching consumers?  Which is the least effective at reaching consumers? Support your opinion. Reading:  Kayode, O. (2014). Marketing Communication Chapter 10 350 Words Minimum

In this discussion, we will examine hotel design and development

In this discussion, we will examine hotel design and development considerations for a specific property in your chosen country. Identify a recently constructed (in the last 6 years) hotel property in your chosen country.  What unique design features in terms of building materials and style and/or amenities were created in

Assignment 1: Assessing and Treating Patients With Impulsivity, Compulsivity, and

  Assignment 1: Assessing and Treating Patients With Impulsivity, Compulsivity, and Addiction Impulsivity, compulsivity, and addiction are challenging disorders for patients across the life span. Impulsivity is the inclination to act upon sudden urges or desires without considering potential consequences; patients often describe impulsivity as living in the present moment

Watch the video on Malden Mills (Links to an external

  For discussion, address the following: Was Feuerstein guided by morals or ethics? Do you think he could have made the decision if Malden were a publicly traded company? Why do you think he has critics for his decision? You must provide citations for all materials used. If you use

Write a college level research paper that fully addresses both

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

1. What is a Botnet? (1 point) 2. In this

1. What is a Botnet? (1 point)  2. In this class you tinkered with an IDS, Snort. Name 5 IDS alternatives. (1 point)  3. International efforts to support Ukrainian cyber defense  (3 points):  Table 1 on this website (https://carnegieendowment.org/2022/11/03/evaluating-international-support-to-ukrainian-cyber-defense-pub-88322) lists 6 such effort areas. Chose any 3 and write a

Information Security and Assurance

DNS           Domain Name Server can be referred to as the address book of the internet. The purpose of Domain name server is to allow all of the computers in the world to communicate with each other. “At its most basic, DNS is a directory of names that match with