Title: CYB 110 Your Dreams Our Mission/newtonhelp.com
1CYB 110 Your Dreams Our Mission/newtonhelp.com
2CYB 110 All Assignments
- For more course tutorials visit
- www.newtonhelp.com
-
- CYB 110 Week 1 Individual Protecting Data
- CYB 110 Week 1 Individual Security Policies
- CYB 110 Week 1 Individual Risk Management
Framework and CIA
3CYB 110 Week 1 Individual Protecting Data
- For more course tutorials visit
- www.newtonhelp.com
-
- CYB 110 Week 1 Individual Protecting Data
- There are many different threats to the
confidentiality, integrity, and availability of
data-at-rest. Some threats affect one of these
security risks (like confidentiality only), and
some threats affect more than one or even all of
these risks.
4CYB 110 Week 1 Individual Risk Management
Framework and CIA
- For more course tutorials visit
- www.newtonhelp.com
-
- Individual Risk Management Framework and CIA
- In Ch. 1, "Introduction to Information Security,"
of Elementary Information Security, you read
about National Institute of Standards and
Technology (NIST) Risk Management Framework (RMF)
and how it expands on the CIA concepts.
5CYB 110 Week 1 Individual Security Policies
- For more course tutorials visit
- www.newtonhelp.com
-
- CYB 110 Week 1 Individual Security Policies
- You have been hired as a security specialist by a
company to provide methods and recommendations to
create a more secure environment for company data.
6CYB 110 Week 2 Individual Configuring Anti-Virus
Software
- For more course tutorials visit
- www.newtonhelp.com
- CYB 110 Week 2 Individual Configuring Anti-Virus
Software - You are a security analyst at a large Security
Operations Center (SOC). Malware infections have
noticeably increased, and all the impacted
machines did not have updated anti-virus
signatures. Your task is to set the anti-virus
software to secure your companys computers.
7CYB 110 Week 2 Individual Run/Playbook Part 1
Malware
- For more course tutorials visit
- www.newtonhelp.com
- Individual Run/Playbook Part 1 Malware
- Create the first section of your
Playbook/Runbook. - This week you researched malware, attack vectors,
and how they are related to cybersecurity. - Write a 1- to 2-page scenario in which a malware
attack occurs. Include the following - Detail the particular malware, the
exploited vulnerability, and its attack vector in
8CYB 110 Week 2 Individual Securing an Operating
System
- For more course tutorials visit
- www.newtonhelp.com
- CYB 110 Week 2 Individual Securing an Operating
System - You are a security administrator responsible for
providing secure configuration requirements for
new laptop deployments. After reading Module 2 of
Certified Secure Computer User v2exercises, apply
the configuration settings below on your Windows
or Mac computer and take screenshots of each
step - Windows
- 1. Lock system when not in use
- 2. Create and change user account password
9CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security
- For more course tutorials visit
- www.newtonhelp.com
- Individual Playbook/Runbook Part 2 Social Network
Security - Add a 1- to 2-page section to your
Playbook/Runbook that includes the following - List of information and data employees
are not to place online - Guidelines for interacting online
- Guidelines for secure use of email
10CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network
- For more course tutorials visit
- www.newtonhelp.com
- CYB 110 Week 3 Individual Social Network
Security Configuring a Social Network - Your company encourages its employees to interact
with the corporate Facebook page as a way to
promote brand awareness and customer engagement.
11CYB 110 Week 4 Individual Configuring Security on
Mobile Devices
- For more course tutorials visit
- www.newtonhelp.com
- CYB 110 Week 4 Individual Configuring Security
on Mobile Devices - Management approved a pilot program in which a
controlled group of users can access certain
company data from personally-owned mobile devices
instead of purchasing corporate mobile devices
for employees and contractors. As the Security
Architect, you must provide Bring Your Own Device
(BYOD) security
12CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines
- For more course tutorials visit
- www.newtonhelp.com
- CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines - Individual Runbook/Playbook Part 3 Network,
Mobile Device, and Cloud Services Guidelines - Add a 1- to 2-page section to your
Playbook/Runbook.
13CYB 110 Week 5 Individual Configure Backup
Settings
- For more course tutorials visit
- www.newtonhelp.com
- Individual Configure Backup Settings
- You want to ensure your personal computer is set
to save data on a daily basis. Using OneDrive
configure a personal computer to save and
maintain data. - Configure backup settings as described below,
14CYB 110 Week 5 Individual Disaster Recovery and
Business Continuity Plan
- For more course tutorials visit
- www.newtonhelp.com
- Individual Disaster Recovery and Business
Continuity Plan - You work for a multi-state company with three
sites in three different - states, 1,000 employees, an ERP application with
a backend database, - and two datacenters.
15CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines
- For more course tutorials visit
- www.newtonhelp.com
- Individual Playbook/Runbook Part 4 Secure Data
Backup Guidelines - NOTE Only Part 4 is Included - Part 1, 2, 3
Not Included. -
- Add a 1- to 2-page section to your
Playbook/Runbook.
16CYB 110 Your Dreams Our Mission/newtonhelp.com