Description
You have been tasked again by FICBANK to analyze their data collection mechanisms. Read this page and go through the linked resources for a more in-depth understanding of log collection, management, and analysis to understand the narrative that you will be following for the assignment in this unit.Read FICBANK’s Email request and use the Project 2 Exercise Instructions to understand what needs to be done on this project. Once you understand the instructions, use the questions and files located in the Project 2 Hands-on Exercises to complete the log analysis.This assignment will familiarize you with performing log analysis across multiple technologies. You should allocate 3-4 hours to perform these tasks. You should also ensure that you are taking proper notes and screenshots during the exercises to complete your Security Monitoring Data Analysis Template and Security Assessment Report. Some students choose to screen-record their progress during the exercises, so they can take screenshots from the recording afterward.Submission: Once you are done with the exercises, be sure that you fill out each piece of the Security Monitoring Data Analysis Template and Security Assessment Report with the details of what you did in the hands-on exercise. The final submission of the Security Assessment Report at the end of the course will be a full report with a combination of every assignment from the course, so keep this in mind as you submit the report each time. Please, also apply proper flow to the formatting and to the narrative in each piece of the report.Before submitting your report, check out the following resources to help you revise your own writing:Organization in WritingParagraphsSentence StructureGrammar and Word ChoiceAdditionally, review how to tailor your writing to a specific Audience to ensure the presentation is tailored to FICBANK. Finally, review Editing and Revising and Fine-Tune Your Writing before hitting submit!Competencies7.2.6 Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems7.2.8 Knowledge of system and application security threats and vulnerabilities7.4.3 Assess the results of threat and vulnerability assessments in order to identify security risks to the information systems