Friday, May 3, 2019

Risk Assessment and Security Controls Assignment

Risk perspicacity and Security Controls - Assignment Example4. Incident response management management oversight, plans, defined roles to quickly note an attack and effectively containing the damage and remove the attackers presence, and restore the integrity of the network and establishment (www.sans.org, nd.) Boundary refutation detect/prevent/ decry flow of data transfer in the network by establishing assorted trust levels. Application software security all acquired software must be managed to prevent, detect and correct security weakness (sans.org c, nd). Malware defence control the spread of malicious code at multiple points. This would accept the rapid update of malware defence, data gathering and corrective action (sans.org b, nd). Data protection must lose tools that will prevent data exfiltration to preserve the integrity of critical data. Data deducty capability the system must properly back up critical data and must have the capability to recover it in the ev ent of the attack and/or loss.10. Continuous vulnerability assessment and remediation - - continuous paygrade of new information to identify vulnerabilities that would minimize if not totally eliminate opportunities for attackers.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.