1 / 34

CYB 110 Extraordinary Life/newtonhelp.com  

For more course tutorials visit<br>www.newtonhelp.com<br><br><br><br>CYB 110 Week 1 Individual Protecting Data<br> CYB 110 Week 1 Individual Security Policies<br> CYB 110 Week 1 Individual Risk Management Framework and CIA<br> CYB 110 Week 2 Individual Securing an Operating System<br>

Télécharger la présentation

CYB 110 Extraordinary Life/newtonhelp.com  

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYB 110 Extraordinary Life/newtonhelp.com

  2. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 All Assignments For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA

  3. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 All Discussion (New Syllabus) For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Discussion Data breach (New Syllabus) CYB 110 Week 2 Discussion Antivirus Software (New Syllabus)

  4. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Apply Week 1 Threats to Confidentiality, Integrity, and Availability (New Syllabus) For more course tutorials visit www.newtonhelp.com Threats to Confidentiality, Integrity, and Availability Assignment Content There are many different threats to the confidentiality, integrity and availability of data-at-rest, data-in-transit, and

  5. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Apply Week 2 Malware Attacks (New Syllabus) For more course tutorials visit www.newtonhelp.com Wk 2 Apply Malware Attacks Assignment Content Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues.

  6. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Apply Week 3 Online Interactions (New Syllabus) For more course tutorials visit www.newtonhelp.com CYB 110 Apply Week 3 Online Interactions Assignment Content Online interactions pose a threat to all servers. There are risks that occur when employees use social networking web browsing and email

  7. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Apply Week 4 Mobile Security (New Syllabus) For more course tutorials visit www.newtonhelp.com Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile

  8. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Apply Week 5 Backup Policies (New Syllabus) For more course tutorials visit www.newtonhelp.com Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans. In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.

  9. CYB 110 Extraordinary Life/newtonhelp.com CYB-110-Entire-Course-(New-Syllabus) For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Discussion Data breach (New Syllabus) CYB 110 Apply Week 1 Threats to Confidentiality, Integrity, and Availability (New Syllabus)

  10. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 1 Discussion Data breach (New Syllabus) For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words. In case of a suspected data breach, what course of action should a chief information security officer (CISO) take?

  11. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 1 Discussion Secure Environment For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words:  Research Playbook/Runbooks and the role they play in security.   Discuss how a Playbook/Runbook relates to creating a secure environment and why policies are important for

  12. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 1 Individual Protecting Data For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats

  13. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 1 Individual Risk Management Framework and CIA For more course tutorials visit www.newtonhelp.com Individual Risk Management Framework and CIA In Ch. 1, "Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the

  14. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 1 Individual Security Policies For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Security Policies You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data.

  15. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 1 Practice Practicelabs Microsoft Security Fundamentals (New Syllabus) For more course tutorials visit www.newtonhelp.com Microsoft Security Fundamentals cyb 110 week 1 practice practicelabs microsoft security fundamentals (new syllabus)

  16. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 2 Discussion Antivirus Software (New Syllabus) For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words. Emma won a laptop at her high school science fair. The laptop does not have antivirus software installed on it so

  17. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 2 Discussion Malware For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words:  Research different types of malware, looking at specific examples and how they affected an organization. List examples of malware that pose threats to individuals or companies and their attack vectors.  

  18. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 2 Individual Configuring Anti-Virus Software For more course tutorials visit www.newtonhelp.com CYB 110 Week 2 Individual Configuring Anti-Virus Software You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably

  19. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 2 Individual Run/Playbook Part 1 Malware For more course tutorials visit www.newtonhelp.com Individual Run/Playbook Part 1 Malware Create the first section of your Playbook/Runbook. This week you researched malware, attack vectors, and how they are related to cybersecurity.

  20. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 2 Individual Securing an Operating System For more course tutorials visit www.newtonhelp.com CYB 110 Week 2 Individual Securing an Operating System You are a security administrator responsible for providing secure configuration requirements for new laptop

  21. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 3 Discussion Online Email Attachments (New Syllabus) For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words. Richard received an email from a person claiming to be his childhood friend, Kate. The email address is unknown to Richard, but the subject says that it is Kate’s new email address. It also has an attachment, which according to

  22. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 3 Discussion Online Interaction Risks For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words:  Retail stores often directly interact with customers online. Staff can also indirectly interact with the public online through their private social media. Discuss risks online interactions pose to a company. How can companies ensure

  23. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security For more course tutorials visit www.newtonhelp.com Individual Playbook/Runbook Part 2 Social Network Security Add a 1- to 2-page section to your Playbook/Runbook that includes the following: • List of information and data employees are not to place online

  24. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network For more course tutorials visit www.newtonhelp.com CYB 110 Week 3 Individual: Social Network Security – Configuring a Social Network Your company encourages its employees to interact with the corporate Facebook page as a way to promote brand

  25. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 4 Discussion Bring Your Own Device For more course tutorials visit www.newtonhelp.com Your company is thinking of introducing a Bring Your Own Device (BYOD) policy. You have been tasked with assessing the risks associated with this implementation, including how to manage malware, data leakage, and access control.

  26. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 4 Discussion Security Measures (New Syllabus) For more course tutorials visit www.newtonhelp.com shereen works as an executive reporter for news todays. the assignment in which she is currently working on will expose a major cover up at the mayors office. all the information shereen has gathered is stored on her phone, She is worried that someone may attempt to steal the phone in order to stop the story

  27. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 4 Individual Configuring Security on Mobile Devices For more course tutorials visit www.newtonhelp.com CYB 110 Week 4 Individual: Configuring Security on Mobile Devices Management approved a pilot program in which a controlled group of users can access certain company data from

  28. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines For more course tutorials visit www.newtonhelp.com CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines Individual Runbook/Playbook Part 3 Network, Mobile Device, an

  29. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 5 Discussion CSCU Exam (New Syllabus) For more course tutorials visit www.newtonhelp.com The Certified Secure Computer User (CSCU) exam is designed for those who use the internet for work, study, or play. Respond to the following in a minimum of 175 words:

  30. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 5 Discussion Data Backup Procedures For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words:  The university you work for has several different functional areas that maintain student information and data (e.g.,

  31. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 5 Individual Configure Backup Settings For more course tutorials visit www.newtonhelp.com Individual Configure Backup Settings You want to ensure your personal computer is set to save data on a daily basis. Using OneDrive configure a personal computer to save and maintain data.

  32. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan For more course tutorials visit www.newtonhelp.com Individual Disaster Recovery and Business Continuity Plan You work for a multi-state company with three sites in three different states, 1,000 employees, an ERP application with a backend database, and two datacenters.

  33. CYB 110 Extraordinary Life/newtonhelp.com CYB 110 Week 5 Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines For more course tutorials visit www.newtonhelp.com Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines NOTE: Only Part 4 is Included - Part 1, 2, & 3 Not Included. Add a 1- to 2-page section to your Playbook/Runbook. Outline guideline policies and procedures to back up and s

  34. CYB 110 Extraordinary Life/newtonhelp.com

More Related