04 Dec Explain the biggest challenges that organizations face in detecting data breaches. In response to your peers, suggest some controls, best practices, or other
In your initial post, explain the biggest challenges that organizations face in detecting data breaches.
In response to your peers, suggest some controls, best practices, or other practical methods to protect against these challenges.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
The biggest challenges organizations have in detecting data breaches most likely include, but is not limited to time and money. I say this because there are so many different options that currently exist in todays market. Some methods of detection could be the Intrusion Detection Systems (IDS) which has many different options such as host or network-based and/or signature or anomaly-based. Organizations with enough resources could choose to implement a combination of these IDS' which is probably the only correct answer, opposed to limiting your methods of detection and only using one.
Setting up honeypots are also another option for detecting real-time data breaches however these require more than just time and money, now the organization has an entire new network to monitor to include the hardware and maintenance required to upkeep and the staffing to monitor its activities. Aside from time and money (resources) being the biggest challenge with regard to detecting data breaches, Organization's taking the time to clearly outline their current security posture and risk models to develop realistic data breach detection framework is a challenge that can be faced and dealt with early on.
RESPONSE TWO
One of the biggest challenges organizations face in detecting data breaches is the increasing sophistication (like stealth) of cyberattacks. Attackers employ advanced techniques like Advanced Persistent Threats (APTs), where an attacker may gain access and stay undetected over long periods of time. There are also zero-day exploits which exploit vulnerabilities before vendors have a chance to fix them and often before the wider community is aware of a problem. Additionally, the use of encryption by attackers can conceal malicious activities from traditional security tools. This makes it difficult for typical detection mechanisms to identify breaches promptly, allowing attackers to exploit vulnerabilities over time (EmergeCyber, n.d.).
Another significant challenge is the rapid expansion of organizational networks due to cloud services, remote work, and the Internet of Things (IoT). This increases the attack surface, making it harder to monitor all potential entry points adequately. The sheer volume of data generated across these platforms is overwhelming. It hinders security teams' ability to distinguish between normal and malicious activities. Also, there's shortage of skilled cybersecurity professionals exacerbates this issue, leaving organizations ill-equipped to manage and respond to threats efficiently (EmergeCyber, n.d.).
Undergraduate Discussion Rubric
Overview
Your ac�ve par�cipa�on in the discussions is essen�al to your overall success this term. Discussion ques�ons will help you make meaningful connec�ons between the course content and
the larger concepts of the course. These discussions give you a chance to express your own thoughts, ask ques�ons, and gain insight from your peers and instructor.
Directions
For each discussion, you must create one ini�al post and follow up with at least two response posts.
For your ini�al post, do the following:
Write a post of 1 to 2 paragraphs.
In Module One, complete your ini�al post by Thursday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your ini�al post by Thursday at 11:59 p.m. of your local �me zone.
Consider content from other parts of the course where appropriate. Use proper cita�on methods for your discipline when referencing scholarly or popular sources.
For your response posts, do the following:
Reply to at least two classmates outside of your own ini�al post thread.
In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of your local �me zone.
Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt.
Discussion Rubric
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Comprehension Develops an ini�al post with an
organized, clear point of view
or idea using rich and
significant detail (100%)
Develops an ini�al post with a
point of view or idea using
adequate organiza�on and
detail (85%)
Develops an ini�al post with a
point of view or idea but with
some gaps in organiza�on and
detail (55%)
Does not develop an ini�al
post with an organized point of
view or idea (0%)
40
Timeliness N/A Submits ini�al post on �me
(100%)
Submits ini�al post one day
late (55%)
Submits ini�al post two or
more days late (0%)
10
10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 1/2
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Engagement Provides relevant and
meaningful response posts
with clarifying explana�on and
detail (100%)
Provides relevant response
posts with some explana�on
and detail (85%)
Provides somewhat relevant
response posts with some
explana�on and detail (55%)
Provides response posts that
are generic with li�le
explana�on or detail (0%)
30
Wri�ng (Mechanics) Writes posts that are easily
understood, clear, and concise
using proper cita�on methods
where applicable with no errors
in cita�ons (100%)
Writes posts that are easily
understood using proper
cita�on methods where
applicable with few errors in
cita�ons (85%)
Writes posts that are
understandable using proper
cita�on methods where
applicable with a number of
errors in cita�ons (55%)
Writes posts that others are
not able to understand and
does not use proper cita�on
methods where applicable (0%)
20
Total: 100%
10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 2/2
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.