logo

CST 610 9043 Cyberspace and Cyber security Foundation

The assignment involves analyzing a network breach and cyberattack against financial service institutions, and providing situational awareness, threat intelligence, and risk response actions.

11 Pages792 Words22 Views
   

Added on  2022-08-24

CST 610 9043 Cyberspace and Cyber security Foundation

The assignment involves analyzing a network breach and cyberattack against financial service institutions, and providing situational awareness, threat intelligence, and risk response actions.

   Added on 2022-08-24

ShareRelated Documents
C S T 6 1 0 9 0 4 3
C Y B E R S P A C E
A N D C Y B E R
S E C U R I T Y
F O U N D A T I O N
N A M E O F T H E S T U D E N T
N A M E O F T H E U N I V E R S I T Y
CST 610 9043 Cyberspace and Cyber security Foundation_1
NETWORK SECURITY:
The network security stands for all of the
procedures and policies which is used by a
network administrator for mitigating the risks
that can come to a network. It includes policies
for recording and finding a possible breach and
policies that is needed to make response to the
events (Perlman, Kaufman & Speciner, 2016).
CST 610 9043 Cyberspace and Cyber security Foundation_2
MISSION CRITICAL
SYSTEMS:
There are various mission critical components
that are included:
Perimeter router
DMZ
DNS server
Web server
Email server
Central switches.
CST 610 9043 Cyberspace and Cyber security Foundation_3
PENETRATION
TESTING:
The pen testing can process automatically with the help of
software applications or it can be performed manually.
The procedure involves in gathering data and information.
The primary objective of the pen testing is actually to
identify the weakness of the security. The pen testing can
also utilized for testing the security policy of the
organisation
CST 610 9043 Cyberspace and Cyber security Foundation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Law Enforcement - Cyber Security | Paper
|12
|2145
|20

Mission-Critical Components of a LAN | Study
|19
|3346
|30

What is penetration testing? | What is pen testing?
|10
|2053
|53

Incident Response Plan Report
|13
|2593
|121

Standard Operating Procedure for Penetration Testing
|11
|1708
|256

Cyber-Security Tools in Using Automating Defense of Networks
|4
|655
|77