Learning Objectives and Outcomes
You will learn to recognize security events and baseline anomalies that might indicate suspicious activity.
You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network.
Assignment Requirements
Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.
After studying the handout, answer the following questions:
Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.
Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.
Required Resources
Worksheet: Testing and Monitoring Security Controls
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Length: 1–2 pages
Due By: Unit 6
Self-Assessment Checklist
I have identified at least two security events and baseline anomalies.
I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.
I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities.
© ITT Educational Services, Inc.
All Rights Reserved. -11- 02/12/2012
NT2580: Unit 5 Testing and Monitoring Security Controls
Network endpoints and network devices have different security considerations and implications. A user workstation implies certain security issues that remain in the user domain while network implications remain part of the LAN or LAN-to-WAN domain. However, during the course of investigating an intrusion, you may have to source data from logs kept in routing devices and