Monitoring and Reporting
Project Part 3: Monitoring and Reporting Scenario Fullsoft’s CTO asks you to continue training the new employee, and highlight the importance of continuously
monitoring, testing, and improving countermeasures. You inform your new teammate that even within the first 24 hours of configuring baseline security, you may
sometimes receive alerts that malware has been quarantined within an antivirus program, discover that a disabled service has been turned on (likely via malware), or
notice a failed attempt to log in captured by the audit log. To illustrate this point, you decide to check and report on the security of the workstation for which you
and your new teammate configured baseline security. In addition, the CTO requests that you write a brief statement explaining how your work on this project relates to
the larger responsibility you have for supporting the company’s success. Your statement will be considered a part of your upcoming performance review. Tasks Check the
Windows 7 workstation you configured (in Project Part 2) for security events. Be sure to review the last 24 hours of the audit log in Event Viewer. Write a brief
report in which you: • Describe all the potentially problematic security events that occurred in the 24-hour period. • Explain what was done (or should be done) to
correct the problems encountered. Also write a brief statement explaining how your work on this project relates to your responsibility to help the company achieve its
goals. Describe at least additional area of concern or emerging trend related to information systems security that you think warrants the company’s attention in the
immediate future. As a reminder, you may use the book for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite
credible sources to support your work. Project Part 3 should be submitted in the following format and style: • Format: Microsoft Word • Font: Arial, Size 12, Double-
Space • Citation Style: Chicago Manual of Style • Length: 1–2 pages Self-Assessment Checklist • I have created a report that shows all potentially problematic security
events that occurred within a 24-hour period, and noted actions that were taken (or should be taken) to address them. • I have explained how my work on this project
relates to my professional responsibility to help the company achieve its goals, and I have proposed at least one area of concern or emerging trend related to
information systems security that warrants additional attention. •
Need help with this Essay/Dissertation?
Get in touch Essay & Dissertation Writing services

