The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Please respond / critic the following:
======================
Three advantages of using a SIEM are:
Â
Three disadvantages of using a SIEM are:
Â
I do feel that SIEM solutions are sufficient. SIEM’s are seen as necessary part of any significant enterprise security effort. With rising trends and forms of attacks today it’s smart to deploy a Security Incident and Event Management (SIEM) solution as a proactive measure for threat management, if the following is true:
Which part of information assurance is the most critical: privacy, regulatory and standards compliance, auditing, business continuity, or disaster recovery? Explain why.
The most critical part of information assurance in my opinion is auditing. It has become a critical mechanism for ensuring the integrity of information systems. Auditing can help to prevent future fiascos such as Enron and WorldCom. Global economies are more interdependent than ever and geopolitical risks impact everyone. IT auditing is an integral part of the audit function. The auditing of complex technologies and communications protocols involves the Internet, intranet, extranet, electronic data interchange, client servers, local and wide area networks, data communications, telecommunications, wireless technology, and integrated voice/data/video systems. IT audit controls are very important. Today, people are shopping around at home through networks. People use "numbers" or accounts to buy what they want via shopping computers. These "numbers" are "digital money," the modern currency in the world. Digital money will bring us benefits as well as problems. "Security" is perhaps the biggest factor for individuals interested in making online purchases by using digital money, and without the auditing process it can be open season for hackers and attackers to go unnoticed.