Computer Security: Test - Essay Example

Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity. 1 . Authentication Failures: unauthorized access attempts 2. Network Abuses: Employees are downloading unauthorized material Part 2: Given a list of end-user policy violations and security breaches, select three reaches and consider best options for monitoring and controlling each incident.

We Will Write A Custom Essay Sample On
ANY TOPIC SPECIFICALLY
FOR YOU

For Only $13.90/page


order now

Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. Open network drive shares allow storage privileges to outside users. A user made unauthorized use of network resources by attacking network entitles. 3. Removable storage drives introduce mallard.