KINDLY USE IN TEXT CITATION IN BOTH ONE AND TWO AND SMALL IN SIMILARITIES THANKS A LOT1)DISCUSSION BOARD > 200 WORDSAnother core function of asset management is monitoring the assets in the...

1 answer below »



KINDLY USE IN TEXT CITATION IN BOTH ONE AND TWO AND SMALL IN SIMILARITIES THANKS A LOT










1)








DISCUSSION BOARD > 200 WORDS



Another core function of asset management is monitoring the assets in the environment for known vulnerabilities. This is done through a well-managed vulnerability management program. As the CCISO for CB Drifter Technologies you need to understand the core function of vulnerability asset management responsible for monitoring the assets in the environment for known vulnerabilities.
In 2-3 paragraphs, describe the key components of the vulnerability management program you would implement.













2)








INDIVIDUAL PROJECT > 800 WORDS





Every endpoint on the organization’s network must be properly secured, hardened, and managed throughout its life cycle to ensure that it is patched, and its vulnerabilities are remediated. Endpoints include servers, desktop computers, laptops, network infrastructure devices, and other assets on the organization’s network. In addition, Identity and Access Management (IAM) systems and processes will need to be implemented for management and control of enterprise resources. In a 4-5-page paper in MS Word provide the following:







  1. Describe in detail as the CCISO how key endpoint security controls should be considered and implemented when hardening assets.



  2. Describe Identity and access management (IAM) systems and processes for management and control access of enterprise resources. Specifically describe the Subject, Object, and Access components of IAM.



  3. Describe the functions of identification, authentication, authorization, and accountability/auditing as IAM fundamentals






Provide the 4-5-page Word paper in the following format:







  • Title Page (does not count towards the page length requirement)



  • Key Endpoint Security Controls



  • IAM Systems



  • IAM Fundamentals



  • Conclusion



  • APA Reference Page does not count towards the page length requirement)













For assistance with your assignment, please use your text, Web resources, and all course materials.







Assignment Reminders:







  • Please submit your


    assignment


    .



  • Make sure you submit this assignment by the listed due date. Late deductions will apply for this assignment. Please refer to the





    Late Submission of Assignment





    policy.






  • If you need assistance, please view theTroubleshooting tips.






    1. Resave in the proper format per the Assignment Detail instructions and resubmit.



    2. Submit with a different Web browser.



    3. Submit from a different computer.



    4. Call Technical Support at 877-221-5800, Menu Option 2. They are open 24/7.



    5. If you are still having difficulties after trying steps 1-4, please contact your course instructor.









Answered 5 days AfterDec 30, 2022

Answer To: KINDLY USE IN TEXT CITATION IN BOTH ONE AND TWO AND SMALL IN SIMILARITIES THANKS A...

Shubham answered on Jan 05 2023
35 Votes
Discussion Board
    Vulnerability management process includes strategies for enabling organization fo
r evaluating and mitigating security vulnerabilities. It is important for ensuring security and can help in eliminating the potential for information leaks. It is required for empowering teams for understanding risk in decision. The first component of the process is discovering and identifying vulnerabilities. This required compiling all assets that are required to be tested (Poddubnyi et al. 2021). This includes gathering information and identifying affected areas. The second process is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here