issc421 forum
Question Description
Scenario:
Twomore weeks have passed and your CISO is excited about implementing thenew controls and solutions that you’ve recommended. Your detailedanalysis of the operational environment and alignment of securitysolutions to the business mission and goals was spot on!
You have gained confidence in the CISO and board of directors, andthey’ve identified additional funding that may be applied towardssecurity. You have asked to implement Security Automation (read about ithere). Then review these additional readings as well:
“The Second Wave”: IS automation – https://www.isaca.org/Journal/archives/2010/Volume-6/Pages/Information-Security-Automation-The-Second-Wave.aspx if that link does not work try this one: https://web.archive.org/web/20160921213850/http://www.isaca.org/Journal/archives/2010/Volume-6/Pages/Information-Security-Automation-The-Second-Wave.aspx
Learn about Intrusion Detection and Prevention: Quick read on IDS/IPS systems – https://www.juniper.net/documentation/en_US/learn-about/LA_IntrusionDetectionandPrevention.pdf
minimum 250 words
You will:
- Briefly list and explain two strengths of one of the technologies discussed in “The Second Wave” reading.
- Explain how a properly configured IDS/IPS system can feed into your overall security plans.
- Explain how the use of an IDS/IPS system can fit into the security automation process.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."