Learning Objectives and Outcomes
You will learn to recognize security events and baseline anomalies that might indicate suspicious activity.
You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network.
Assignment Requirements
Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.
After studying the handout, answer the following questions:
Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.
Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.
Required Resources
Worksheet: Testing and Monitoring Security Controls
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Length: 1–2 pages
Due By: Unit 6
Self-Assessment Checklist
I have identified at least two security events and baseline anomalies.
I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.
I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities. Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP)
Learning Objectives and Outcomes
You will learn to successfully identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents.
Assignment Requirements
Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden:
No peer-to-peer file sharing or externally reachable file