CYB 110 Academic

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

CYB 110 All Discussion (New Syllabus)

For more course tutorials visit

www.tutorialrank.com

CYB 110 Week 1 Discussion Data breach (New Syllabus)

CYB 110 Week 2 Discussion Antivirus Software (New Syllabus)

CYB 110 Week 3 Discussion Online Email Attachments (New Syllabus)

CYB 110 Week 4 Discussion Security Measures (New Syllabus)


CYB 110 Week 5 Discussion CSCU Exam (New Syllabus)

CYB 110 Week 1 Discussion Secure Environment

CYB 110 Week 2 Discussion Malware

CYB 110 Week 3 Discussion Online Interaction Risks

CYB 110 Week 4 Discussion Bring Your Own Device

CYB 110 Week 5 Discussion Data Backup Procedures


.....................................................................................................................
.........................................

CYB 110 Apply Week 1 Threats to Confidentiality,


Integrity, and Availability (New Syllabus)
For more course tutorials visit

www.tutorialrank.com

Threats to Confidentiality, Integrity, and Availability

Assignment Content

There are many different threats to the confidentiality, integrity and


availability of data-at-rest, data-in-transit, and processing Some threats
affect one of these security risks like confidentiality only, and some
threats affect more than one or even all these risks.

Create a 1-to 2-page table in Microsoft Word, listing a minimum of 6


threats using the column headers and details below:
- Title Page

• Introduction paragraph(s) - Threat - List the threat.

- Threat to Type of Data (data-at-rest.data-in-transitor processing)

- Identify the type,

- Confidentiality/Integrity/Availability

-Identify whether some or all are affected by labelling: C. Land/or.

- Mitigation Suggestion

- Describe a mitigation plan in 2-3 sentences. .

Conclusions . References
Example: Threat: Password Compromise

Threat to Type of Deta: DotoAr-Rest

Confidentiality/Integrity/Availability: CL&A

Mitigation: Employ a strong password that is changed at regular


intervals. Do not share your password or write it down on sticky notes
on your desk

Include a short paragraph that highlights two access control techniques


or policies that enforce security,

Cite at least two resources within the assignment in APA format.

Submit your assignment. You must use an assignment template if one is


provides under the course resources.
.....................................................................................................................
.........................................

CYB 110 Apply Week 2 Malware Attacks (New Syllabus)


For more course tutorials visit

www.tutorialrank.com

Wk 2 Apply Malware Attacks

Assignment Content

Playbooks, sometimes known as Standing Operating Procedures (SOP)


or runbooks, are used for troubleshooting common issues. They are
often created by a team of employees who are trained to manage security
issues. Playbooks often include bulleted lists, step-by-step instructions,
and/or diagrams: all of which make it easy to follow troubleshooting
instructions.

Throughout the next four weeks. you will develop a series of playbooks
for a fictional company that hired you to write their playbooks and
manage the team. The first portion of the playbook is a response to
malware at the company.
Outline a 2-to 3-page playbook in which a malware attack of your
choice occurs.

Include the following information:

Title Page Introduction paragraph(s)

Details of the malware paragraph(s). The exploited vulnerability and its


attack vector paragraph(s)

Two risks of this malware paragraph(s) Step-by-step instructions on how


to resolve the malware attack. Provide a prescriptive series of
steps/checklist items with instructions you would utilize to deal with and
mitigate the attack. Conclusions paragraph(s) References list

Note: Numbered or bulleted steps/guidelines make the document easy to


for others to follow under potential stressful situations. Paragraphs can
be used to help support the steps/guidelines

Cite at least two resources within the assignment in APA format


Submit your assignment. You must use an assignment template if one is
provides under the course resources

.....................................................................................................................
.........................................

CYB 110 Apply Week 3 Online Interactions (New


Syllabus)
For more course tutorials visit

www.tutorialrank.com

CYB 110 Apply Week 3 Online Interactions

Assignment Content

Online interactions pose a threat to all servers. There are risks that occur
when employees use social networking web browsing and email.
Playbooks typically cover a section related to threats and defenses of
online interactions.
In this next section of your series of playbooks, outline steps to take
when an employee reports clicking on a website that appeared in an
email that was received

Include the following information in this section

Title Page

• Introduction paragraph(s)

Descriptions of two threats this interaction poses on the company


Step-by-step instructions on how to mitigate each interaction. Provide a
prescriptive series of steps/checklist items with instructions you would
utilize to deal with and mitigate the attack. . Conclusions paragraph(s)

References list

Note: Numbered or bulleted steps/guidelines make the document easy to


for others to follow under potential stressful situations. Paragraphs can
be used to help support the steps/guidelines

Cite at least two resources within the assignment in APA format.

Submit your assignment. You must use an assignment template if one is


provides under the course resources,

.....................................................................................................................
.........................................

CYB 110 Apply Week 4 Mobile Security (New Syllabus)


For more course tutorials visit

www.tutorialrank.com
Mobile devices are always in the workplace and being used for both
personal and company business. You have been asked to create an
informative poster to display throughout the office that highlights ways
to secure mobile devices and safety precautions. This poster will be seen
by the entire company in hopes of empowering employees to protect
themselves and the company from mobile breaches.

Create a visual poster or infographic to display in the company’s break


room.

Include the following information:

At least two mobile device threats

List of ideal mobile security settings to defend against threats

Brief instructions for setting up at least two security settings

An explanation on what happens mobile devices are not secured from


these threats

Appropriate images and graphics

Two resources for more information on mobile security, with


appropriate citations

.....................................................................................................................
.........................................

CYB 110 Apply Week 5 Backup Policies (New Syllabus)


For more course tutorials visit

www.tutorialrank.com

Securing company data is not as simple as backing up to another hard


drive. It is important to have backup tools, processes, and policies for
both business continuity and disaster recovery plans.

In the final section of your playbook, create a 3- to 4-page outline of


backup policies for when the data center is inaccessible.

Include the following in your outline:

A list of tools used for backup purposes

An explanation of the following:

Where employees should work from that day

How employees can get to their data

The communication methods about updates

A step-by-step guide to recover your databases and telecommunications

A step-by-step guide to recover and provide any additional company


assets

A description of policies for backup media storage


A description of policies for encryption of backup data

Note: Numbered or bulleted steps/guidelines make the document easy to


for others to follow under potential stressful situations. Paragraphs can
be used to help support the steps/guidelines.

Cite at least two resources within the assignment in APA format.

.....................................................................................................................
.........................................

CYB 110 Entire Course (New Syllabus)


For more course tutorials visit

www.tutorialrank.com

CYB 110 Week 1 Discussion Data breach (New Syllabus)

CYB 110 Apply Week 1 Threats to Confidentiality, Integrity, and


Availability (New Syllabus)
CYB 110 Week 1 Practice Practicelabs Microsoft Security
Fundamentals (New Syllabus)

CYB 110 Week 2 Discussion Antivirus Software (New Syllabus)

CYB 110 Apply Week 2 Malware Attacks (New Syllabus)

CYB 110 Week 3 Discussion Online Email Attachments (New Syllabus)

CYB 110 Apply Week 3 Online Interactions (New Syllabus)


CYB 110 Week 4 Discussion Security Measures (New Syllabus)

CYB 110 Apply Week 4 Mobile Security (New Syllabus)

CYB 110 Week 5 Discussion CSCU Exam (New Syllabus)

CYB 110 Apply Week 5 Backup Policies (New Syllabus)

.....................................................................................................................
.........................................

CYB 110 Week 1 Discussion Data breach (New Syllabus)


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words.

In case of a suspected data breach, what course of action should a chief


information security officer (CISO) take?

How does the type of data breach affect the actions?


Select one type of data breach and the course of action that should be
taken.

.....................................................................................................................
.........................................

CYB 110 Week 1 Discussion Secure Environment


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Research Playbook/Runbooks and the role they play in security.

Discuss how a Playbook/Runbook relates to creating a secure


environment and why policies are important for enforcing security.

.....................................................................................................................
.........................................
CYB 110 Week 1 Practice Practicelabs Microsoft Security
Fundamentals (New Syllabus)
For more course tutorials visit

www.tutorialrank.com

Microsoft Security Fundamentals

cyb 110 week 1 practice practicelabs microsoft security fundamentals


(new syllabus)

.....................................................................................................................
.........................................

CYB 110 Week 2 Discussion Antivirus Software (New


Syllabus)
For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words.


Emma won a laptop at her high school science fair. The laptop does not
have antivirus software installed on it so Emma must purchase one.
She’ll be using the laptop for college applications, schoolwork, and
hopefully next year as a college freshman.

Respond to the following in a minimum of 175 words:

What top two factors should Emma keep in mind before purchasing the
software?

Why are these the top factors to consider?

Where should she make the purchase?

.....................................................................................................................
.........................................

CYB 110 Week 2 Discussion Malware

For more course tutorials visit


www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Research different types of malware, looking at specific examples and


how they affected an organization. List examples of malware that pose
threats to individuals or companies and their attack vectors.

Discuss how companies or individuals can protect themselves from these


malware examples

.....................................................................................................................
.........................................

CYB 110 Week 3 Discussion Online Email Attachments


(New Syllabus)
For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words.


Richard received an email from a person claiming to be his childhood
friend, Kate. The email address is unknown to Richard, but the subject
says that it is Kate’s new email address. It also has an attachment, which
according to the subject, is a childhood picture of them.

Respond to the following in a minimum of 175 words:

What steps should Richard take to verify the authenticity of Kate’s new
email ID?

How should Richard make sure that the attachment is not malicious?

.....................................................................................................................
.........................................

CYB 110 Week 3 Discussion Online Interaction Risks


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:


Retail stores often directly interact with customers online. Staff can also
indirectly interact with the public online through their private social
media. Discuss risks online interactions pose to a company. How can
companies ensure appropriate interaction is taking place and balance that
with security?
.....................................................................................................................
.........................................

CYB 110 Week 4 Discussion Bring Your Own Device


For more course tutorials visit

www.tutorialrank.com

Your company is thinking of introducing a Bring Your Own Device


(BYOD) policy. You have been tasked with assessing the risks
associated with this implementation, including how to manage malware,
data leakage, and access control.

Research threats and vulnerabilities by mobile and other devices


introduced to networks through BYOD policies.
Discuss the following:

What risks do these devices pose?

How do you manage BYODs in a secure way to prevent malware, data


leakage, and control access?

.....................................................................................................................
.........................................

CYB 110 Week 4 Discussion Security Measures (New


Syllabus)
For more course tutorials visit

www.tutorialrank.com

shereen works as an executive reporter for news todays. the assignment


in which she is currently working on will expose a major cover up at the
mayors office. all the information shereen has gathered is stored on her
phone, She is worried that someone may attempt to steal the phone in
order to stop the story

Respond to the following in a minimum of 175 words.


What are two security measures shereen can take to secure her mobile
device?

Describe how to setup these security measures


.....................................................................................................................
.........................................

CYB 110 Week 5 Discussion Data Backup Procedures


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

The university you work for has several different functional areas that
maintain student information and data (e.g., registrar, accounting,
financial aid, academic departments, etc.).

Discuss what role backup policies and procedures play in protecting an


organization with many different departments and their data. Why is it
important to back up data? What are some examples of secure policies
and procedures that could be used in this scenario to protect student
information?

You might also like