CYB 110 Academic
CYB 110 Academic
CYB 110 Academic
www.tutorialrank.com
www.tutorialrank.com
Assignment Content
- Confidentiality/Integrity/Availability
- Mitigation Suggestion
Conclusions . References
Example: Threat: Password Compromise
Confidentiality/Integrity/Availability: CL&A
www.tutorialrank.com
Assignment Content
Throughout the next four weeks. you will develop a series of playbooks
for a fictional company that hired you to write their playbooks and
manage the team. The first portion of the playbook is a response to
malware at the company.
Outline a 2-to 3-page playbook in which a malware attack of your
choice occurs.
.....................................................................................................................
.........................................
www.tutorialrank.com
Assignment Content
Online interactions pose a threat to all servers. There are risks that occur
when employees use social networking web browsing and email.
Playbooks typically cover a section related to threats and defenses of
online interactions.
In this next section of your series of playbooks, outline steps to take
when an employee reports clicking on a website that appeared in an
email that was received
Title Page
• Introduction paragraph(s)
References list
.....................................................................................................................
.........................................
www.tutorialrank.com
Mobile devices are always in the workplace and being used for both
personal and company business. You have been asked to create an
informative poster to display throughout the office that highlights ways
to secure mobile devices and safety precautions. This poster will be seen
by the entire company in hopes of empowering employees to protect
themselves and the company from mobile breaches.
.....................................................................................................................
.........................................
www.tutorialrank.com
.....................................................................................................................
.........................................
www.tutorialrank.com
.....................................................................................................................
.........................................
www.tutorialrank.com
.....................................................................................................................
.........................................
www.tutorialrank.com
.....................................................................................................................
.........................................
CYB 110 Week 1 Practice Practicelabs Microsoft Security
Fundamentals (New Syllabus)
For more course tutorials visit
www.tutorialrank.com
.....................................................................................................................
.........................................
www.tutorialrank.com
What top two factors should Emma keep in mind before purchasing the
software?
.....................................................................................................................
.........................................
.....................................................................................................................
.........................................
www.tutorialrank.com
What steps should Richard take to verify the authenticity of Kate’s new
email ID?
How should Richard make sure that the attachment is not malicious?
.....................................................................................................................
.........................................
www.tutorialrank.com
www.tutorialrank.com
.....................................................................................................................
.........................................
www.tutorialrank.com
www.tutorialrank.com
The university you work for has several different functional areas that
maintain student information and data (e.g., registrar, accounting,
financial aid, academic departments, etc.).