Cyber Security Best Practices and Monitoring. Review the announcements on submission requirements and grading criteria. Number each question as 1, 2, etc. to match with the question number. Use the citation rule. Adequate coverage of a single question (and there is more than one question in this assignment) is possible between 200 and 400 words. Any reference list, diagram, chart, table, etc. included are not counted towards the word limit.

Cyber Security Best Practices and Monitoring

Cyber Security Best Practices and Monitoring

Question 1. Explain five cyber security best practices, and for each one, explain what it is, why it is used, how it is used (not expected to implement but be able to explain), and an example on the context (organization, any security domain) where it can be used. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.

Question 2. Share three cyber security best practices that could be applied to the US government/military. For each, explain what it is, why it should be used, and its application (not expected to implement but be able to explain). I will understand if you include in this answer the best practice(s) that you have noted in question 1. But also try to look at from the unique angle of the US government as its needs could be unique. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.

Question 3. From the global perspective (a corporation that has IT spread across the world, US government/military, and worldwide cyber vigilance), explain three cyber security best practices, what they are, why they should be used, and how to use (not expected to implement but be able to explain). I will understand if you include in this answer the best practice(s) that you have noted in the above question(s). But also try to look at it from the global perspective and any unique need. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.

Question 4. Explain the importance of monitoring the IT infrastructure, and the expected frequency to monitor depending on the nature of the vulnerability. Provide one example of any single IT area of your choice that needs to be monitored with the proposed frequency to monitor. Examples of different IT areas to monitor could be a specific component of the network, or hardware, or Cloud, or database, or any particular software or tool or IT product, or a part of IT infrastructure, or patch management, etc. and you can choose any one IT area from this or anything else of your choice. Next, you propose how frequently you think it needs to be monitored based on your analysis. For example, it could require 24/7 monitoring or it needs to be once a day, or once a week but that will depend depending on the usage of the IT area by an organization It is also possible that one organization may have a more frequent need to monitor an IT area but a different organization may have a less frequent need to monitor this, and it depends on its business need and usage.

Next, study two tools of your choice that can be used for cyber security monitoring, Explain what it is, why it should be used, and how to use it (not expected to implement but be able to explain). You can choose a tool found in the course learning resource, or a different tool.

Question 5. For the SYO 601, explain any lessons that you have learned on domain 3 which is Implementation. It is not expected that you will have a complete mastery on this topic in one week, along with learning additional lessons. But this gives the students an exposure, if there is an interest.

References

At the end of all the answers, list at least 5 references used in all the answers using the citation rule (see the course announcement on course protocol which notes the citation rule), and also cite the references in-line within the body of the writing.

Requirements: Answer questions 1 – 5, FSU uses Turnitin, 5 References