Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: January 26th, 2023

CYB 670 Analyze the Security Baseline of the Global Economic Summit

CYB 670 Analyze the Security Baseline of the Global Economic Summit
Your team’s analysis of the policy matrix will allow team members to create an overview of the methods used to provide a Security Baseline Report of the organization and the need for evolving summit communications.

Your team’s baseline analysis should also include an Assessment of network forensics information such as traffic analysis and intrusion analysis, as well as the type of information needed for any future forensics investigations. The team’s Assessment of information needs for network forensics could include what is needed to support security software and hardware across multiple platforms, multiple applications, and multiple architectures to communicate with the other nations. All teams will do this by using security baseline tools to build an audit file and then scan their systems. The systems should be hardened based on the policies, procedures, and standards to ensure desired levels of enterprise-wide information assurance requirements developed by the Global Economic Summit.

In the Security Baseline Report, which also includes the Attribution Report, Network Security Checklist, and the System Security Risk and Vulnerabilities Report, your team will use scanning and auditing functions to determine the baseline security posture of your nation team system and those of the other nation teams.

As you perform your baseline, address the following tasks:

Define the components you are searching for in this baseline determination and what you would do in light of possible disasters.
Include the systems-level diagram of how your nation team is configured, which can be obtained from your lab documentation.
How would you recover information assets, and how would you ensure integrity of data if such a situation were to take place?
What are the steps to producing the scan and audit report? What are the communication ports to be used or closed during operation during the Global Economic Summit?
How will you maintain a baseline of registers and images of data? How would you ensure integrity of these components over time?
What are different ways to implement security controls to a system after the security posture has been defined, in order to meet the policy requirements?
What are the missing security configurations or security updates, if any? Report on how these should be addressed to fortify the security posture of the nation system.
In your scanning, can you determine if there are missing security updates on target computers based on your access? If so, what were they, and what tool did you use for this scan? Is there security from/to the IP network to/from the PSTN caller? You will be given decryption information, and then you will determine what are the data types in transit. Identify if these are image files, or document files, and anything else.
Your team will provide all artifacts from the baseline scanning exercise and refer to them in the security baseline analysis report.

Additionally, you should assess (compare) security issues during the scans and provide issues created by social engineering. You should cover the following testing while implementing network infrastructure contingency and recovery plans in your comparison:

damage assessments
types of vulnerabilities and associated attacks
distributed computing model
information assurance (IA) principles
digital certificates
digital signatures (significance of public-key infrastructure)
These will be provided in the Security Baseline Report. Remember to discuss your findings with your team members while you take part in the lab.

Complete This Lab

Resources

Accessing the Virtual Lab Environment: Navigating UMGC Virtual Labs and Lab Setup
Self-Help Guide (Workspace): Getting Started and Troubleshooting
Link to the Virtual Lab Environment: https://vdi.umgc.edu/
Lab Instructions

Security Baseline Lab Exercise
Getting Help

To obtain lab Helpance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

Case Type: UMGC Virtual Labs Support
Customer Type: Student (Note: faculty should choose Staff/Faculty.)
SubType: ELM Cyber (CBR/CST/DFC/CYB)
SubType Detail: Pick the category that best fits the issue you are experiencing.
Email: Type the email that you currently use for classroom communications.
In the form’s description box, provide information about the issue. Add screenshots or supporting documents, and include details such as steps you took and system responses.

Take screenshots of your completed exercises. Then, compile your screenshots into a single document to include in your Security Baseline Report.

To complete the Security Baseline Lab Exercise for the Global Economic Summit, the team should perform the following tasks:
Define the components they are searching for in the baseline determination and plan for possible disasters.
Include a systems-level diagram of how the nation team’s system is configured, obtained from lab documentation.
Plan for how to recover information assets and ensure the integrity of data in case of a disaster.
Outline the steps for producing the scan and audit report, including the communication ports to be used or closed during operation during the summit.
Discuss plans for maintaining a baseline of registers and images of data, and ensuring the integrity of these components over time.
Identify different ways to implement security controls to the system after the security posture has been defined, in order to meet policy requirements.
Report on any missing security configurations or updates and plan for how to address them to fortify the system’s security posture.
Use scanning tools to determine if there are any missing security updates on target computers and identify the data types in transit.
Provide all artifacts from the baseline scanning exercise and refer to them in the security baseline analysis report.
Compare security issues during the scans and provide issues created by social engineering.
Assess and discuss the following in the report: damage assessments, types of vulnerabilities and associated attacks, distributed computing model, information assurance (IA) principles, digital certificates, and digital signatures (significance of public-key infrastructure)
Discuss findings with team members and seek Helpance as needed by filling out the support request form with “UMGC Virtual Labs Support” as the Case Type.

Order | Check Discount

Tags: Best Assignment Help Australia, Can Someone Write My Assignment for Me, can you write my dissertation, Do my assignment Australia, do my dissertation

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00