Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the...

1 answer below »
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security (CIS) critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization towards compliance. They are not meant to be used in isolation. Comparing an organization’s technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders. Prompt After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below: I. Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders). A. Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use. II. Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified either by policy, implementation, automation, or reporting to enhance security for the organization. A. Subcontrol One: Describe the modification of the subcontrol and justify your recommendation. B. Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation. III. Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication. A. Discuss the merits of using RSA encryption and the implementation of two-factor authentication. B. Discuss how different forms of encryption may be used in VPN software.
Answered Same DayJun 06, 2022

Answer To: Security analysts play an important role working alongside the computer incident response team...

Amar Kumar answered on Jun 06 2022
100 Votes
Report technical concerns to non-technical people
To really impart specialized material, use humor and modesty.
Continuously endeavor to cause your crowd to feel calmer while talking ab
out code or introducing specialized material. To begin the discussion, kid about being a "PC geek" or "tech nerd," and apologize early on the off chance that you get excessively specialized.
Non-nerds (as well as other specialized experts prepared in different fields) may feel as though you're addressing them every time you give new material, in spite of your earnest attempts.
All through your show, focus on your crowd.
You might change your material in view of what you find out about the room by understanding it. The thought is to be conversational at whatever point you discuss your specialized information with a non-specialized crowd. Regardless of whether you've depicted innovation to individuals many times and are a specialist on the point, the person with whom you're as of now bantering might be finding out about it interestingly. Continuously present with energy and passion.
While conveying specialized information, incorporate story.
At the point when you have a ton of material or information to introduce, don't barrage your crowd with it. Permit time for them to handle your subject, opposing the drive to pack everything about a slide and simply perusing it out.
Assuming you're utilizing PowerPoint to convey your material, remember that each slide ought to add to the show instead of divert from it. Try not to depend on dreary stock photos or charts to convey your thought really and quickly. Consider each slide as far as how it will lead your watchers on a way from point A to point B.
To convey specialized realities and methodology, utilize visual substance.
Composed material and spoken clarifications are both significant method for passing on...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here