Spelunking With Splunk Refer to the attached requirements and guidelines in the uploads. Note: This assignment has two options. If you are experiencing tec

Spelunking With Splunk Refer to the attached requirements and guidelines in the uploads. Note: This assignment has two options. If you are experiencing tec

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Refer to the attached requirements and guidelines in the uploads.

Note: This assignment has two options. If you are experiencing technical difficulties with Option A, please feel free to submit Option B.


Option A: Splunk Enterprise Security

Enterprise security may seem like a daunting task. How can you manage all of the systems, hardware, and activities going on in your enterprise while keeping them safe and secure? Furthermore, how do you know when things go wrong? Enter: Splunk. Designed to give you a bird’s eye view of the enterprise and a real-time update on events and attacks, Splunk is available to try out in a sandbox mode. This is especially helpful to see such a service in action before putting your own organization under the microscope.

To get started, visit 
www.splunk.com (Links to an external site.)
 and register as a new user. Once you register, login to the main page and click on “My Dashboard” at the top right. Under “Free Trials and Downloads”, select “Splunk Enterprise Security”. Select “Start Trial” on the next page and follow the instructions to setup. Take some time to explore the dashboard and see what is available.  Once you are ready, visit 
Using Enterprise Security to find Malware (Links to an external site.)
 tutorial.

Additional info:

·
Introduction to the dashboards available in Splunk Enterprise Security (Links to an external site.)

·
Create a glass table in Splunk Enterprise Security (Links to an external site.)

Follow these guides to see how you can identify and investigate issues, isolate events, and find malware across our entire enterprise. To accomplish this lab, you will need to take screenshots of the following relevant interfaces as you work through them. This will include:

1. The Security Posture dashboard

2. The Incident Review dashboard

3. Editing a notable event (assigning status and owner)

4. A description of the most critical event

5. The Asset Investigator view of an event

6. The Top Most Notable Event Sources (click the highest ranking)

7. An exported results report

8. The Risk Analysis view

9. The Incident Review Audit view

10. A glass table view

Submit a Word document with all screenshots included.

Parameters

· The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins

· Use APA for citing references and quotations

· See the lab rubric below for more details 

 


Option B: Security in Academia

Imagine you have been hired as the CIO for Florida Tech and tasked with overhauling the university’s security architecture. As an organization, Florida Tech has a range of users and responsibilities to them, both on main campus and remote. To determine what should be done, perform a case study that outlines the following:

· Perform an information assessment to identify the types of data the institution has (You may want to check 
https://access.fit.edu/ (Links to an external site.)
 to see what platforms we rely on)

· Identify user groups and data usage policies

· Perform an asset review to catalog all resources available. 
https://it.fit.edu/ (Links to an external site.)
 is a good starting point for this.

· Review vendor/third-party relationships. Identify their privacy policies and any available information on their security policies.

· Review existing security policies

· Prepare a cybersecurity incident response plan for at least 3 distinct scenarios.

Submit a Word document with your security review (minimum 750 words)

Parameters

· The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins

· Use APA for citing references and quotations

Place your order now for a similar assignment and have exceptional work written by one of our experts, guaranteeing you an A result.

Need an Essay Written?

This sample is available to anyone. If you want a unique paper order it from one of our professional writers.

Get help with your academic paper right away

Quality & Timely Delivery

Free Editing & Plagiarism Check

Security, Privacy & Confidentiality