The Cyberscope application refers to an interactive tool that is applied on the web allowing agencies to report on data that comply with the rules Federal Information Security Management Act. It has been associated with a lot of advantages since its introduction that include helping agencies in identifying its weaknesses hence enables cyber enterprise better placed to defend against attackers through making their assets more reliance. The application is also less expensive as compared to the traditional methods of reporting hence saves agencies money (DHS, 2011).
The only challenge facing Cyberscope is that it is a new application hence requires additional training and specialization. A part from using Cuyberscope to ensure continuous monitoring, an organization can use a cybersecurity dashboard and LogRythm which serve the same purpose in a comprehensive, timely, and secure manner.
Discuss the Major Challenges In Continuous Monitoring Of Information Systems Security
Lowering TCO
Continuous monitoring solutions have been observed to take a lot of time in their operation, management, and configuration hence rely heavily on manual complex process making them cost-prohibitive, inefficient, and produce results that are not consistent. This challenge can be solved by the use of LogRythm which is easy to operate, manage, and deploy. Its reporting, alerting and monitoring processes are automated hence delivers real-time results that are consistent (Mell, 2011).
Advances Persistent Threats
Large enterprises as well as government organizations are increasingly becoming targets to Advanced Persistent Threats and this makes it difficult for them to adapt to new and sophisticated malware and rapidly changing malicious behavior. LogRhythm’s Advanced Intelligence Engine ensures that every log data automatic analysis shows any APT-style attack (NIST, 2011).
References
DHS (2011). “Continuous Asset Evaluation, Situational Awareness, and Risk Scoring Reference Architecture Report (CAESARS).” Department of Homeland Security.
Mell, P. (2011). “Presentation: An Enterprise Continuous Monitoring Technical Reference Model.” Jointly developed by the U.S. National Security Agency, the U.S. Department of Homeland Security, and the National Institute of Standards and Technology
NIST (2011). “Information Security Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations.” National Institute of Standards and Technology Special Publication 800137








Jermaine Byrant
Nicole Johnson



