CYB/110 Foundations of Security
CYB/110 ENTIRE CLASS    CYB/110 ENTIRE CLASS  

Or you may purchase tutorials by the Week below.

CYB/110 Threats to Confidentiality, Integrity, and Availability Table
CYB/110 WEEK 1 LABS
CYB/110 WEEK 1 LABS
CYB/110 UOP Tutorials Homework Help

CYB/110 Week 1

Everything listed for Week 1 is included in purchase!! 

 

Get ALL Week 1 Assignments for one LOW Price! 

 

Apply: Signature Assignment:

Threats to Confidentiality, Integrity, and Availability 

Includes Option #1

Includes Option #2

Includes Option #3

Many different threats can arise to the confidentiality, integrity and availability of data-at-rest, data-in-transit, and processing. Some threats affect only 1 of these security risks (like confidentiality only), and other threats affect more than1 or even all these risks.

Create a 1 -to 2-page table in Microsoft Word, listing a minimum of 6 threats using the column headers and details below:

  • Threat
  • Threat to Type of Data
  • Confidentiality/Integrity/Availability
  • Mitigation Suggestion

Within your table

  • Identify relevant threats. List 1 per column.
  • Determine the type of data threatened (data-at-rest, data-in-transit, or processing). Identify the data type in the column.
  • Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
  • Describe the mitigation plan in 2 to 3 sentences in the column.

Include a short paragraph that highlights 2 access control techniques or policies that enforce security

Cite at least 2 resources to support your assignment

Format your assignment according to APA guidelines.

Submit your assignment.

 

WEEK 1 LABS INCLUDED (with Screenshots):

Practice Labs: CompTIA Security+
Practice Labs: Microsoft Security Fundamentals

 

 

CYB 110 Week 1 Discussion - Data Breach

Respond to the following in a minimum of 175 words. 

  • In case of a suspected data breach, what course of action should a chief information security officer (CISO) take?
  • How does the type of data breach affect the actions?
  • Select one type of data breach and the course of action that should be taken.

 

 


CYB/110 Week 2 Honeypots uop tutorials
CYB/110 Week 2 Practice LABS
CYB/110 Week 2 Understanding IDS Firewall Evasion and Honeypots
Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.

CYB/110 Week 2

Everything listed for Week 2 is included in purchase!! 

 

Get ALL Week 2 Assignments for one LOW Price! 

 

Wk 2 Apply Malware Attacks  

Includes Option #1 A+ Work!

Includes Option #2 A+ Work!

Includes Option #3 A+ Work!

Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams, all of which make it easy to follow troubleshooting instructions.
Throughout the next 4 weeks. you will develop a playbook for a fictional company that hired you to write their playbooks and manage the t eam. The first portion of the playbook is a response to malware at the company.

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.

Complete the following in your outline:

Provide details of the malware.

Identify the exploited vulnerability and its attack vector

Analyze the vulnerability to determine 2 risks of this malware.

Outline step-by-step instructions on how to resolve the malware attack.

Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines.

Note: You will use content from your Week 2 assignment as part of the Signature Assignment you will submit in Week 3.

Cite at least 2 resources to support your assignment.

Format your assignment according to APA guidelines.

Submit your Assignment.

 

CYB/110 WK2 LABS (with Screenshots) INCLUDED:

Practice Labs: Threats and Compliance
Practice Labs: Microsoft Security Fundamentals
Practice Labs: Understanding IDS Firewall Evasion and Honeypots

 

Week 2 Discussion - Antivirus Software

Emma won a laptop at her high school science fair. The laptop does not have antivirus software installed on it so Emma must purchase one. She’ll be using the laptop for college applications, schoolwork, and hopefully next year as a college freshman.

Respond to the following in a minimum of 175 words:

  • What top two factors should Emma keep in mind before purchasing the software?
  • Why are these the top factors to consider?
  • Where should she make the purchase?

 

 

CYB/110 UOP Tutorials
CYB/110 Week 3 Online Interactions
CYB/110 Week 3 LABS UOP
CYB/110 Online interactions pose a threat to all servers. Some risks can occur when employees use social networking,

CYB/110 Week 3

Everything listed for Week 3 is included in purchase!! 

Get ALL Assignments for one LOW Price! 

 

CYB 110 Apply Week 3 Online Interactions

Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.
In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received
Include the following information in this section:
Describe 2 threats this interaction poses on the company.
Provide step-by-step instructions on how to mitigate each interaction.

Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines.

Cite at least 2 resources to support your assignment.

Format your assignment according to APA guidelines.
Submit your assignment.

 

CYB/110 WK3 LABS (with Screenshots) INCLUDED:

Microsoft Security LABS - Understand Internet Security

Week 3 CompTIA Security+ LAB

Practice Labs: Microsoft Security Fundamentals

 

 

Week 3 Discussion - Online Email Attachments

Richard received an email from a person claiming to be his childhood friend, Kate. The email address is unknown to Richard, but the subject says that it is Kate’s new email address. It also has an attachment, which according to the subject, is a childhood picture of them. 
Respond to the following in a minimum of 175 words:

  • What steps should Richard take to verify the authenticity of Kate’s new email ID?
  • How should Richard make sure that the attachment is not malicious?

 

CYB/110 WK4 DQ Security Measures
CYB/110 WEEK 4 Mobile Security
CYB/110 Create a visual poster or infographic to display in the company’s break room.
CYB/110 You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices

CYB/110 Week 4

Everything listed for Week 4 is included in purchase!! 

 

Get ALL Assignments for one LOW Price! 

 

Apply: Mobile Security

Includes Poster #1

Includes Poster #2

Includes Poster #3

Includes Poster #4

Includes Poster #5

Plus includes extra blank posters you can use!

Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.

Create a visual poster or infographic to display in the company’s break room.

Include the following information:

  • At least 2 mobile device threats.
  • List of ideal mobile security settings to defend against threats.
  • Brief instructions for setting up at least 2 security settings.
  • An explanation on what happens when mobile devices are not secured from these threats
  • Appropriate images and graphics
  • 2 resources for more information on mobile security, with appropriate citations

 

 

Week 4 Discussion - Security Measures

Shereen works as an executive reporter for news todays. The assignment in which she is currently working on will expose a major cover up at the mayors office. All the information Shereen has gathered is stored on her phone. She is worried that someone may attempt to steal the phone in order to stop the story.

 

Respond to the following in a minimum of 175 words.

What are two security measures Shereen can take to secure her mobile device?

Describe how to setup these security measures.

 

 

 

CYB/110 WEEK 5 UOP TUTORIALS Playbook Backup Policies
CYB/110 WK5 Securing company data is not as simple as backing up to another hard drive.
CYB/110 UOP Tutorials
CYB/110 WEEK 5 Signature Assignment: Backup Policies

CYB/110 Week 5

Everything listed for Week 5 is included in purchase!! 

 

Get ALL Assignments for one LOW Price! 

 

 

Apply: Signature Assignment: Backup Policies

NOTE: Only the Week5 Section of the Playbook is included in the Week 5 tutorials.

Includes Playbook Option #1

Includes Playbook Option #2

Includes Playbook Option #3

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.
In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.
Complete the following in your outline:

  • List the tools used for backup purposes
  • Explain the following:
    • Where employees should work from that day
    • How employees can get to their data
    • The communication methods about updates
  • Outline step-by-step instructions to recover your databases and telecommunications.
  • Provide a step-by-step guide to recover and provide any additional company assets.
  • Discuss policies for backup media storage.
  • Discuss policies for encryption of backup data.

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines.
Cite at least two resources within the assignment in APA format.

Format your assignment according to APA guidelines.

Submit your completed Playbook for this assignment.

 

Practice  Labs: Compliance – Backup Execution and Frequency

Screenshot included

 

 

Discussion Question: CSCU Exam

The Certified Secure Computer User (CSCU) exam is designed for those who use the internet for work, study, or play.

Respond to the following in a minimum of 175 words:

  • How could this industry certification benefit you and your personal career goals?

  • What are two other resources you can use to prepare for this exam besides the materials provided in this course?