Title: CYB 110 Teaching Effectively--snaptutorial.com (2)
1CYB 110 Teaching Effectively--snaptutorial.com
2CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 All Assignments For more classes
visit www.snaptutorial.com CYB 110 Week 1
Individual Protecting Data CYB 110 Week 1
Individual Security Policies CYB 110 Week 1
Individual Risk Management Framework and
CIA CYB 110 Week 2 Individual Securing an
Operating System
3CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 1 Individual Protecting Data For
more classes visit www.snaptutorial.com CYB
110 Week 1 Individual Protecting Data There are
many different threats to the confidentiality,
integrity, and availability of data-at-rest. Some
threats affect one of these security risks (like
confidentiality only), and some threats affect
more than one or even all of these risks. Create
a 1-page table in Microsoft Word or Excel
listing a minimum of five threats using the
column headers Threat to Data-at-Rest,
Confidentiality/Integrity/Availability, and
Suggestion on Countering the Threat.
4CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 1 Individual Risk Management
Framework and CIA For more classes
visit www.snaptutorial.com Individual Risk
Management Framework and CIA In Ch. 1,
"Introduction to Information Security," of
Elementary Information Security, you read about
National Institute of Standards and Technology
(NIST) Risk Management Framework (RMF) and how it
expands on the CIA concepts. Assume that a
security model is needed for the protection of
information in your class.
5CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 1 Individual Security Policies For
more classes visit www.snaptutorial.com CYB
110 Week 1 Individual Security Policies You have
been hired as a security specialist by a company
to provide methods and recommendations to create
a more secure environment for company data. Write
a 1- to 2-page recommendation paper outlining
methods the company should consider to protect
access to data, including recommendations for
policies to be enacted that will increase data
security. Submit your assignment using the
Assignment Files tab.
6CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 2 Individual Configuring Anti-Virus
Software For more classes visit www.snaptutorial
.com CYB 110 Week 2 Individual Configuring
Anti-Virus Software You are a security analyst at
a large Security Operations Center (SOC). Malware
infections have noticeably increased, and all the
impacted machines did not have updated anti-virus
signatures. Your task is to set the anti-virus
software to secure your companys
computers. Note Module 3 of Certified Secure
Computer User details two options for anti-virus
protection, Kaspersky and Avast anti-virus
software.
7CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 2 Individual Run/Playbook Part 1
Malware For more classes visit www.snaptutorial.
com Individual Run/Playbook Part 1
Malware Create the first section of your
Playbook/Runbook. This week you researched
malware, attack vectors, and how they are related
to cybersecurity. Write a 1- to 2-page scenario
in which a malware attack occurs. Include the
following Detail the particular malware,
the exploited vulnerability, and its attack
vector in your scenario.
8CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 2 Individual Securing an Operating
System For more classes visit www.snaptutorial.c
om CYB 110 Week 2 Individual Securing an
Operating System You are a security administrator
responsible for providing secure configuration
requirements for new laptop deployments. After
reading Module 2 of Certified Secure Computer
User v2exercises, apply the configuration
settings below on your Windows or Mac computer
and take screenshots of each step Windows 1.
Lock system when not in use
9CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security For more classes
visit www.snaptutorial.com Individual
Playbook/Runbook Part 2 Social Network
Security Add a 1- to 2-page section to your
Playbook/Runbook that includes the following
List of information and data employees are
not to place online Guidelines for
interacting online
10CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network For more classes
visit www.snaptutorial.com CYB 110 Week 3
Individual Social Network Security Configuring
a Social Network Your company encourages its
employees to interact with the corporate Facebook
page as a way to promote brand awareness and
customer engagement. Your company wants employees
to verify that their social media accounts are
secure before engaging with a public corporate
Facebook page that has thousands of users. Your
task is to create a reference document
demonstrating appropriate secure settings for
Facebook.
11CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 4 Individual Configuring Security on
Mobile Devices For more classes
visit www.snaptutorial.com CYB 110 Week 4
Individual Configuring Security on Mobile
Devices Management approved a pilot program in
which a controlled group of users can access
certain company data from personally-owned mobile
devices instead of purchasing corporate mobile
devices for employees and contractors. As the
Security Architect, you must provide Bring Your
Own Device (BYOD) security best practice
guidelines for employees to secure any personal
mobile device used in the pilot program. Your
task is to create a document demonstrating
appropriate security settings. Configure the
mobile device security settings as follows,
taking screenshots to demonstrate your
knowledge Android or Apple
12CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines For more classes visit www.snaptutori
al.com Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines Add a 1- to 2-page section to your
Playbook/Runbook. Create a prescriptive section
of your Playbook providing guidelines to secure
each of these areas Network connections
Mobile devices Cloud services Revise
your previous week's Playbook/Runbook based on
your facilitator's feedback and submit as a
13CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 5 Individual Configure Backup
Settings For more classes visit www.snaptutorial
.com Individual Configure Backup Settings You
want to ensure your personal computer is set to
save data on a daily basis. Using OneDrive
configure a personal computer to save and
maintain data. Configure backup settings as
described below, taking screenshots to
demonstrate your knowledge Schedule a
daily backup to an external physical storage
device. Schedule a weekly backup to
Microsoft OneDrive.
14CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 5 Individual Disaster Recovery For
more classes visit www.snaptutorial.com Individu
al Disaster Recovery and Business Continuity
Plan You work for a multi-state company with
three sites in three different states, 1,000
employees, an ERP application with a backend
database, and two datacenters. Prepare a 2- to
2.5-page Disaster Recovery and Business
Continuity Plan in Microsoft Word for your
company. Include how you plan to Recover your
databases and telecommunications.
15CYB 110 Teaching Effectively--snaptutorial.com
CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines For more classes
visit www.snaptutorial.com Individual
Playbook/Runbook Part 4 Secure Data Backup
Guidelines NOTE Only Part 4 is Included - Part
1, 2, 3 Not Included. Add a 1- to 2-page
section to your Playbook/Runbook. Outline
guideline policies and procedures to back up and
secure your company's data. Revise your previous
week's Playbook/Runbook based on your
facilitator's feedback and compile as a complete
document.
16CYB 110 Teaching Effectively--snaptutorial.com