CYB 110 Inspiring Minds/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 110 Inspiring Minds/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA – PowerPoint PPT presentation

Number of Views:4
Slides: 17
Provided by: redflowers23

less

Transcript and Presenter's Notes

Title: CYB 110 Inspiring Minds/newtonhelp.com


1
CYB 110 Inspiring Minds/newtonhelp.Com
2
  • CYB 110 All Assignments
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 1 Individual Protecting Data
  • CYB 110 Week 1 Individual Security Policies
  • CYB 110 Week 1 Individual Risk Management
    Framework and CIA
  • CYB 110 Week 2 Individual Securing an Operating
    System
  • CYB 110 Week 2 Individual Configuring Anti-Virus
    Software
  • CYB 110 Week 3 Individual Social Network
    Security Configuring a Social Network

3
  • CYB 110 Week 1 Individual Protecting Data
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 1 Individual Protecting Data
  • There are many different threats to the
    confidentiality, integrity, and availability of
    data-at-rest. Some threats affect one of these
    security risks (like confidentiality only), and
    some threats affect more than one or even all of
    these risks.
  • Create a 1-page table in Microsoft Word or
    Excel listing a minimum of five threats using
    the column headers Threat to Data-at-Rest,
    Confidentiality/Integrity/Availability, and
    Suggestion on Countering the Threat.

4
  • CYB 110 Week 1 Individual Risk Management
    Framework and CIA
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Risk Management Framework and CIA
  • In Ch. 1, "Introduction to Information Security,"
    of Elementary Information Security, you read
    about National Institute of Standards and
    Technology (NIST) Risk Management Framework (RMF)
    and how it expands on the CIA concepts.

5
  • CYB 110 Week 1 Individual Security Policies
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 1 Individual Security Policies
  • You have been hired as a security specialist by a
    company to provide methods and recommendations to
    create a more secure environment for company
    data.
  • Write a 1- to 2-page recommendation paper
    outlining methods the company should consider to
    protect access to data, including recommendations
    for policies to be enacted that will increase
    data security.
  • Submit your assignment using the Assignment Files
    tab.

6
  • CYB 110 Week 2 Individual Configuring Anti-Virus
    Software
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 2 Individual Configuring Anti-Virus
    Software
  • You are a security analyst at a large Security
    Operations Center (SOC). Malware infections have
    noticeably increased, and all the impacted
    machines did not have updated anti-virus
    signatures. Your task is to set the anti-virus
    software to secure your companys computers.

7
  • CYB 110 Week 2 Individual Run/Playbook Part 1
    Malware
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Run/Playbook Part 1 Malware
  • Create the first section of your
    Playbook/Runbook.
  • This week you researched malware, attack vectors,
    and how they are related to cybersecurity.
  • Write a 1- to 2-page scenario in which a malware
    attack occurs. Include the following
  • Detail the particular malware, the
    exploited vulnerability, and its attack vector in
  • your scenario.

8
  • CYB 110 Week 2 Individual Securing an Operating
    System
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 2 Individual Securing an Operating
    System
  • You are a security administrator responsible for
    providing secure configuration requirements for
    new laptop deployments. After reading Module 2 of
    Certified Secure Computer User v2exercises, apply
    the configuration settings below on your Windows
    or Mac computer and take screenshots of each
    step
  • Windows
  • 1. Lock system when not in use

9
  • CYB 110 Week 3 Individual Playbook/Runbook Part 2
    Social Network Security
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Playbook/Runbook Part 2 Social Network
    Security
  • Add a 1- to 2-page section to your
    Playbook/Runbook that includes the following
  • List of information and data employees
    are not to place online
  • Guidelines for interacting online
  • Guidelines for secure use of email

10
  • CYB 110 Week 3 Individual Social Network Security
    Configuring a Social Network
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 3 Individual Social Network
    Security Configuring a Social Network
  • Your company encourages its employees to interact
    with the corporate Facebook page as a way to
    promote brand awareness and customer engagement.
    Your company wants employees to verify that their
    social media accounts are secure before engaging
    with a public corporate Facebook page that has
    thousands of users. Your task is to create a
    reference document demonstrating appropriate
    secure settings for Facebook.

11
  • CYB 110 Week 4 Individual Configuring Security on
    Mobile Devices
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 4 Individual Configuring Security
    on Mobile Devices
  • Management approved a pilot program in which a
    controlled group of users can access certain
    company data from personally-owned mobile devices
    instead of purchasing corporate mobile devices
    for employees and contractors. As the Security
    Architect, you must provide Bring Your Own Device
    (BYOD) security best practice guidelines for
    employees to secure any personal mobile device
    used in

12
  • CYB 110 Week 4 Individual Runbook/Playbook Part 3
    Network, Mobile Device, and Cloud Services
    Guidelines
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 4 Individual Runbook/Playbook Part 3
    Network, Mobile Device, and Cloud Services
    Guidelines
  • Individual Runbook/Playbook Part 3 Network,
    Mobile Device, and Cloud Services Guidelines
  • Add a 1- to 2-page section to your
    Playbook/Runbook.
  • Create a prescriptive section of your Playbook
    providing guidelines to secure each of these
    areas
  • Network connections

13
  • CYB 110 Week 5 Individual Configure Backup
    Settings
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Configure Backup Settings
  • You want to ensure your personal computer is set
    to save data on a daily basis. Using OneDrive
    configure a personal computer to save and
    maintain data.
  • Configure backup settings as described below,
    taking screenshots to demonstrate your knowledge
  • Schedule a daily backup to an external
    physical storage device.

14
  • CYB 110 Week 5 Individual Disaster Recovery and
    Business Continuity Plan
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Disaster Recovery and Business
    Continuity Plan
  • You work for a multi-state company with three
    sites in three different
  • states, 1,000 employees, an ERP application with
    a backend database,
  • and two datacenters.
  • Prepare a 2- to 2.5-page Disaster Recovery and
    Business Continuity
  • Plan in Microsoft Word for your company. Include
    how you plan to

15
  • CYB 110 Week 5 Individual Playbook/Runbook Part 4
    Secure Data Backup Guidelines
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Playbook/Runbook Part 4 Secure Data
    Backup Guidelines
  • NOTE Only Part 4 is Included - Part 1, 2, 3
    Not Included.
  • Add a 1- to 2-page section to your
    Playbook/Runbook.
  • Outline guideline policies and procedures to back
    up and secure your company's data.
  • Revise your previous week's Playbook/Runbook
    based on your facilitator's feedback and compile
    as a complete document.

16
CYB 110 Inspiring Minds/newtonhelp.Com
Write a Comment
User Comments (0)
About PowerShow.com