Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: April 12th, 2022

DIFFERENTIATE THE ROLES OF INTERNAL AND EXTERNAL SECURITY CONTROLS

Computer Sciences and Information Technology
DIFFERENTIATE THE ROLES OF INTERNAL AND EXTERNAL SECURITY CONTROLS
This is a cybersecurity course. The rubric is attached

Purpose – In this Assignment, you will look at security controls, and how they are tested.

Assignment Instructions:
Using the Reading, the library, and Internet research, answer or explain the following in a minimum 400-word paper that covers the following and includes three or more APA style references:

Differentiate perimeter controls from internal controls. Give examples.
What controls constitute a defense in depth strategy? Explain.
How are security controls tested and verified?

DIFFERENTIATE THE ROLES OF INTERNAL AND EXTERNAL SECURITY CONTROLS
When it comes to cybersecurity, access control is an important aspect as it determines what can be viewed by authorized personnel within a computing environment. Through such action, risk is minimized within an organization, especially in this era where companies are sensitive of brand image. Perimeter security are man-made barriers aimed at keeping intruders out to regulate access, whereas, internal control is a set of policies made by an organization to safeguard its assets and promote accountability. Perimeter controls limit physical access to the organizations outside environment, buildings, rooms and tangible IT assets. Internal controls on the other hand touches on limited access to data, the network connections and system files (Rouse 2014). Examples of perimeter controls include:
• Firewalls: check the packets of data that move to and fro within the network and decides which ones will be granted access and which ones will be denied access.
• Fences and walls
• Vehicle barriers
• Pedestrian barriers
Examples of internal controls include:
• Vendor Patching: updating software to the latest version to prevent hacking.
• Encryption Policy: specifications of encryption algorithms, key lengths and timings to be used.
• Confidentiality Agreements: a legal document that binds employees to keeping the company information as secrets.
A defense in depth strategy is creation of a system that protects, detects and responds to attacks. Perimeter controls constitute a defense in depth strategy though the implementation of firewalls, routers and Intrusion Detection systems. What a firewall basically does is, it checks the packets of data that move to and fro within the network and decides which ones will be granted access and which ones will be denied access. A set of regulations are normally in place to determine these parameters. Threat protection is a reason why firewalls are proving to be very important. As much as antiviruses provide a solution against viruses, Firewalls provide better protection to guarding a computer against threats. One can choose between an appliance firewall and a client firewall to protect the network as well as the connection to the internet. What an appliance firewall does is, it is configured to monitor all the data that travels on the network within the computer; it is inbuilt within the computer. A client firewall on the other hand ensures that there is a secure connection between the internet and the computer itself. The system is then designed in layers that overlap each other so that prevention, detection and response is realized (Breithaupt & Merkow 2014). Through the use of a layered system, if one layer fails, then there are two more layers that can still be relied upon.
Security controls can be tested through:
• Establishment of Security Metrics: determining the scope of the security program so as to measure performance, determine operational statistics, and compliance goals.
• Vulnerability and Penetration testing: helps the organization to determine the extent of security. Weaknesses are discovered during the vulnerability assessment tests while they are exploited in the penetration tests to determine if possible threats can be launched through the current weaknesses.
• Internal Auditing: the documented organizational policies, as well as stakeholders’ responses to interviews in regard to their understanding of the activities in place with respect to cybersecurity are used to evaluate security control operations (Bakertilly 2017).
Verification can be achieved through constant monitoring of the control environment to make sure that the cybersecurity program is effective within the organization.
Reference
Baker Tilly. (2017). Monitoring and verifying cybersecurity controls effectiveness. Retrieved from https://www.bakertilly.com/insights/monitoring-and-verifying-cybersecurity-controls-effectiveness/
Breithaupt, J., & Merkow, M. (2014). Principle 3: Defense in Depth as Strategy | Information Security Principles of Success | Pearson IT Certification. Retrieved from http://www.pearsonitcertification.com/articles/article.aspx?p=2218577&seqNum=4
Rouse, M. (2014). What is access control? – Definition from WhatIs.com. Retrieved from https://searchsecurity.techtarget.com/definition/access-control

Order | Check Discount

Tags: apps that write essays for you free, assignment writing services in usa, bes, best dissertation writing services, best essay writing service, best paper writing services

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00