Title: CYB 110 Dreams Come True / newtonhelp.com
1CYB 110 Dreams Come True / newtonhelp.com
2CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 All Assignments
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 1 Individual Protecting Data
- CYB 110 Week 1 Individual Security Policies
- CYB 110 Week 1 Individual Risk Management
Framework and CIA - CYB 110 Week 2 Individual Securing an Operating
System
3CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 All Discussion (New Syllabus)
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
- CYB 110 Week 1 Discussion Data breach (New
Syllabus) -
- CYB 110 Week 2 Discussion Antivirus Software (New
Syllabus) -
- CYB 110 Week 3 Discussion Online Email
Attachments (New Syllabus) -
- CYB 110 Week 4 Discussion Security Measures (New
Syllabus) -
- CYB 110 Week 5 Discussion CSCU Exam (New
Syllabus) -
- CYB 110 Week 1 Discussion Secure Environment
-
- CYB 110 Week 2 Discussion Malware
4CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Apply Week 1 Threats to Confidentiality,
Integrity, and Availability (New Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Threats to Confidentiality, Integrity, and
Availability -
- Assignment Content
- There are many different threats to the
confidentiality, integrity and availability of
data-at-rest, data-in-transit, and processing
Some threats affect one of these security risks
like confidentiality only, and some threats
affect more than one or even all these risks.
5CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Apply Week 2 Malware Attacks (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Wk 2 Apply Malware Attacks
-
- Assignment Content
- Playbooks, sometimes known as Standing Operating
Procedures (SOP) or runbooks, are used for
troubleshooting common issues. They are often
created by a team of employees who are trained to
manage security issues. Playbooks often include
bulleted lists, step-by-step instructions, and/or
diagrams all of which make it easy to follow
troubleshooting instructions. - Throughout the next four weeks. you will develop
a series of playbooks for a fictional company
that hired you to write their playbooks and
manage the team. The first portion of the
playbook is a response to malware at the company. - Outline a 2-to 3-page playbook in which a malware
attack of your choice occurs. - Include the following information
- Title Page Introduction paragraph(s)
- Details of the malware paragraph(s). The
exploited vulnerability and its attack vector
paragraph(s) - Two risks of this malware paragraph(s)
Step-by-step instructions on how to resolve the
malware attack. Provide a prescriptive series of
steps/checklist items with instructions you would
u
6CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Apply Week 3 Online Interactions (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- CYB 110 Apply Week 3 Online Interactions
-
- Assignment Content
- Online interactions pose a threat to all servers.
There are risks that occur when employees use
social networking web browsing and email.
Playbooks typically cover a section related to
threats and defenses of online interactions.
7CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Apply Week 4 Mobile Security (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Mobile devices are always in the workplace and
being used for both personal and company
business. You have been asked to create an
informative poster to display throughout the
office that highlights ways to secure mobile
devices and safety precautions.
8CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Apply Week 5 Backup Policies (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Securing company data is not as simple as backing
up to another hard drive. It is important to have
backup tools, processes, and policies for both
business continuity and disaster recovery plans. - In the final section of your playbook, create a
3- to 4-page outline of backup policies for when
the data center is inaccessible.
9CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Entire Course (New Syllabus)
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
- CYB 110 Week 1 Discussion Data breach (New
Syllabus) -
- CYB 110 Apply Week 1 Threats to Confidentiality,
Integrity, and Availability (New Syllabus) -
- CYB 110 Week 1 Practice Practicelabs Microsoft
Security Fundamentals (New Syllabus) -
-
- CYB 110 Week 2 Discussion Antivirus Software (New
Syllabus) -
- CYB 110 Apply Week 2 Malware Attacks (New
Syllabus) - CYB 110 Week 3 Discussion Online Email
Attachments (New Syllabus)
10CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 1 Discussion Data breach (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Respond to the following in a minimum of 175
words. -
- In case of a suspected data breach, what course
of action should a chief information security
officer (CISO) take? - How does the type of data breach affect the
actions? - Select one type of data breach and the course of
action that should be taken.
11CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 1 Discussion Secure Environment
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Respond to the following in a minimum of 175
words -
- Research Playbook/Runbooks and the role they play
in security. - Discuss how a Playbook/Runbook relates to
creating a secure environment and why policies
are important for enforcing security.
12CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 1 Individual Protecting Data
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 1 Individual Protecting Data
- There are many different threats to the
confidentiality, integrity, and availability of
data-at-rest. Some threats affect one of these
security risks (like confidentiality only), and
some threats affect more than one or even all of
these risks.
13CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 1 Individual Risk Management
Framework and CIA -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- Individual Risk Management Framework and CIA
- In Ch. 1, "Introduction to Information Security,"
of Elementary Information Security, you read
about National Institute of Standards and
Technology (NIST) Risk Management Framework (RMF)
and how it expands on the CIA concepts.
14CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 1 Individual Security Policies
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 1 Individual Security Policies
- You have been hired as a security specialist by a
company to provide methods and recommendations to
create a more secure environment for company
data. - Write a 1- to 2-page recommendation paper
outlining methods the company should consider to
protect access to data, including recommendations
for policies to be enacted that will increase
data security. - Submit your assignment using the Assignment Files
tab.
15CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 1 Practice Practicelabs Microsoft
Security Fundamentals (New Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Microsoft Security Fundamentals
-
- cyb 110 week 1 practice practicelabs microsoft
security fundamentals (new syllabus) -
16CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 2 Discussion Antivirus Software (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Respond to the following in a minimum of 175
words. -
- Emma won a laptop at her high school science
fair. The laptop does not have antivirus software
installed on it so Emma must purchase one. Shell
be using the laptop for college applications,
schoolwork, and hopefully next year as a college
freshman. -
- Respond to the following in a minimum of 175
words - What top two factors should Emma keep in mind
before purchasing the software? - Why are these the top factors to consider?
- Where should she make the purchase?
17CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 2 Discussion Malware
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Respond to the following in a minimum of 175
words -
- Research different types of malware, looking at
specific examples and how they affected an
organization. List examples of malware that pose
threats to individuals or companies and their
attack vectors. - Discuss how companies or individuals can protect
themselves from these malware examples
18CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 2 Individual Configuring Anti-Virus
Software -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 2 Individual Configuring Anti-Virus
Software - You are a security analyst at a large Security
Operations Center (SOC). Malware infections have
noticeably increased, and all the impacted
machines did not have updated anti-virus
signatures. Your task is to set the anti-virus
software to secure your companys computers. - Note Module 3 of Certified Secure Computer User
details two options for anti-virus protection,
Kaspersky and Avast anti-virus software. - Choose one of the following two options
19CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 2 Individual Run/Playbook Part 1
Malware -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- Individual Run/Playbook Part 1 Malware
- Create the first section of your
Playbook/Runbook. - This week you researched malware, attack vectors,
and how they are related to cybersecurity. - Write a 1- to 2-page scenario in which a malware
attack occurs. Include the following
20CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 2 Individual Securing an Operating
System -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 2 Individual Securing an Operating
System - You are a security administrator responsible for
providing secure configuration requirements for
new laptop deployments. After reading Module 2 of
Certified Secure Computer User v2exercises, apply
the configuration settings below on your Windows
or Mac computer and take screenshots of each
step
21CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 3 Discussion Online Email
Attachments (New Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Respond to the following in a minimum of 175
words. -
- Richard received an email from a person claiming
to be his childhood friend, Kate. The email
address is unknown to Richard, but the subject
says that it is Kates new email address. It also
has an attachment, which according to the
subject, is a childhood picture of them.
22CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 3 Discussion Online Interaction
Risks -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Respond to the following in a minimum of 175
words -
- Retail stores often directly interact with
customers online. Staff can also indirectly
interact with the public online through their
private social media. Discuss risks online
interactions pose to a company. How can companies
ensure appropriate interaction is taking place
and balance that with security?
23CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- Individual Playbook/Runbook Part 2 Social Network
Security - Add a 1- to 2-page section to your
Playbook/Runbook that includes the following - List of information and data employees
are not to place online - Guidelines for interacting online
24CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 3 Individual Social Network
Security Configuring a Social Network - Your company encourages its employees to interact
with the corporate Facebook page as a way to
promote brand awareness and customer engagement.
Your company wants employees to verify that their
social media accounts are secure before engaging
with a public corporate Facebook page that has
thousands of users. Your task is to create a
reference document demonstrating appropriate
secure settings for Facebook.
25CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 4 Discussion Bring Your Own Device
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Your company is thinking of introducing a Bring
Your Own Device (BYOD) policy. You have been
tasked with assessing the risks associated with
this implementation, including how to manage
malware, data leakage, and access control. - Research threats and vulnerabilities by mobile
and other devices introduced to networks through
BYOD policies. - Discuss the following
26CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 4 Discussion Security Measures (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- shereen works as an executive reporter for news
todays. the assignment in which she is currently
working on will expose a major cover up at the
mayors office. all the information shereen has
gathered is stored on her phone, She is worried
that someone may attempt to steal the phone in
order to stop the story -
- Respond to the following in a minimum of 175
words. - What are two security measures shereen can take
to secure her mobile device? - Describe how to setup these security measures
27CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 4 Individual Configuring Security on
Mobile Devices -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 4 Individual Configuring Security
on Mobile Devices - Management approved a pilot program in which a
controlled group of users can access certain
company data from personally-owned mobile devices
instead of purchasing corporate mobile devices
for employees and contractors. As the Security
Architect, you must provide
28CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines - Individual Runbook/Playbook Part 3 Network,
Mobile Device, and Cloud Services Guidelines - Add a 1- to 2-page section to your
Playbook/Runbook.
29CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 5 Discussion CSCU Exam (New
Syllabus) -
- For more course tutorials visit
- www.newtonhelp.com
-
-
- The Certified Secure Computer User (CSCU) exam is
designed for those who use the internet for work,
study, or play. - Respond to the following in a minimum of 175
words -
- How could this industry certification benefit
you and your personal career goals? - What are two other resources you can use to
prepare for this exam besides the materials
provided in this course?
30CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 5 Discussion Data Backup Procedures
-
- For more course tutorials visit
- www.newtonhelp.com
-
-
- Respond to the following in a minimum of 175
words -
- The university you work for has several different
functional areas that maintain student
information and data (e.g., registrar,
accounting, financial aid, academic departments,
etc.). - Discuss what role backup policies and procedures
play in protecting an organization with many
different departments and their data. Why is it
important to back up data? What are some examples
of secure policies and procedures that could be
used in this scenario to protect student
information?
31CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 5 Individual Configure Backup
Settings -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- Individual Configure Backup Settings
- You want to ensure your personal computer is set
to save data on a daily basis. Using OneDrive
configure a personal computer to save and
maintain data. - Configure backup settings as described below,
taking screenshots to demonstrate your knowledge - Schedule a daily backup to an external
physical storage device. - Schedule a weekly backup to Microsoft
OneDrive.
32CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 5 Individual Disaster Recovery and
Business Continuity Plan -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- Individual Disaster Recovery and Business
Continuity Plan - You work for a multi-state company with three
sites in three different - states, 1,000 employees, an ERP application with
a backend database, - and two datacenters.
33CYB 110 Dreams Come True / newtonhelp.com
- CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines -
- For more course tutorials visit
- www.newtonhelp.com
-
-
-
- Individual Playbook/Runbook Part 4 Secure Data
Backup Guidelines - NOTE Only Part 4 is Included - Part 1, 2, 3
Not Included. -
- Add a 1- to 2-page section to your
Playbook/Runbook. - Outline guideline policies and procedures to back
up and secure your company's data.
34CYB 110 Dreams Come True / newtonhelp.com