Overview
You work for Strategic Security Consulting Group (SSCG). Recently, one of your clients in Los Angeles, North Star Software Developers (NSSD), called with a big problem. Some of its network servers were compromised, resulting in the possible loss of personal information and credit card numbers of purchasers of the company’s software products. It is not presently known whether this attack came from inside or outside of the company. NSSD is currently dealing with this problem as best as it can, but it needs your company to help prevent this from happening again in the future.
Prompt
You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place.
In each section of the training manual, develop guidelines for employees to select and employ specific software, tools, or methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools.
Specifically, the following critical elements must be addressed:
- Communicate the significance of viewing, displaying, and filtering captured packets.
- Explain the significance of alert response procedures to traffic anomalies identified through monitoring network traffic and examining logs.
What to Submit
Fill in Section One of the Training Manual Template document. This section contains two topics in which you will address best practices and tools and methodology. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.
ABC Group Training Quality Manual
CYBERLEET TRAINING MANUAL
North Star Software Developers
Company Training Manual
Prepared by:
[Alexander, Apanyin]
Section One: Traffic Analysis 6
1.1 Significance of Traffic Analysis 6
1.2 Traffic Analysis Tools and Methodology 6
2.1 Significance of Firewalls 7
2.2 Firewall Tools and Methodology 7
Section Three: Intrusion Detection and Prevention 8
3.1 Significance of Intrusion Detection and Prevention Systems (IDPS) 8
3.2 IDPS Tools and Methodology 8
Section Four: Vulnerability Assessment 9
4.1 Significance of Vulnerability Assessment 9
4.2 Vulnerability Assessment Tools and Methodology 9
Section Five: Network Scanning and Assessment 10
5.1 Significance of Network Scanning and Assessment 10
5.2 Network Scanning and Assessment Tools and Methodology 10
Section Six: Auditing and Log Collection 11
6.1 Significance of Auditing and Log Collection 11
6.2 Auditing and Log Collection Tools and Methodology 11
7.1 A Brief Overview of Tools Used in This Manual 12
Introduction and Purpose
Section One: Traffic Analysis
Section Two: Firewalls
Section Three: Intrusion Detection
Section Four: Vulnerability Assessment
Section Five: Network Assessment
<a rel='nofo