CMGT/245 IS Security Concepts |
|
Or you may purchase tutorials by the Week below.
|
|
|
|
|
CMGT/245 Week 1
Individual: Lab and Review
Includes Option #1
Includes Option #2
After completing the lab assignments this week, reflect on the issues
you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes
the following:
• Any issues you encountered while completing the labs
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of
network vulnerabilities in order to help protect other networks
• A description of the screenshots from each lab and what was done
Submit your assignment.
Includes Week 1 Network Vulnerabilites Part 1 Screenshots
Includes Week 2 Network Vulnerabilities Part 2 Screenshots
CMGT/245 Week 1 Discussion Questions
Includes Answer Response #1
Includes Answer Response #2
Research three or four areas within an organization that use Information Technology in a critical business function.
Discuss what type of technology is used, the purpose, and the consequences of security breaches related to information.
|
|
|
|
|
CMGT/245 Week 2
Includes Everything listed for Week 2!
Individual: Scanning and Remediating Vulnerabilities with
OpenVAS & Introduction to Digital Forensics
Includes Option #1 with Screenshots
Includes Option #2 with Screenshots
Includes Option #3 with Screenshots
Complete the following labs in the Practice Labs course CompTIA
Security+:
• "Scanning and Remediating Vulnerabilities with OpenVAS"
• "Introduction to Digital Forensics"
Capture screenshots during the final step of each lab and place in a
Microsoft® Word document.
After completing the lab assignments this week, reflect on the issues
you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes
the following as applicable:
• Any issues you encountered while completing the labs
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of
network vulnerabilities in order to help protect other networks
• A description of the screenshots from each lab and what was done
Submit your assignment using the Assignment Files tab. The report
must be submitted with full citations and using proper APA formating for
all references. I fully expect that you will reference any materials that
are used in preparation of this assignment.
Discussion Question: SSAE 16 and SOC Audit Reporting
Includes 3 Full Answers to Discussion Question
Consider how a provider of technology services might use standards, such as those discussed in "SSAE No. 16" and "Service Organizations Control (SOC) Reports," to market its products, as well as manage the relationship and limit risk for the buyer of those services.
Read "SSAE 16 Overview" from the SSAE 16 website.
Read "Service Organization Control (SOC) Reports" from the SSAE 16 website.
Discuss the "Service Organization Control (SOC) Reports" and what they provide the buyer. Review the SOC Type 1 and Type 2 Audit Reports. Discuss their importance to the buyer of services.
Discussion Question: Risk Management Process
Includes 3 Full Answers to Discussion Question
Research different approaches to the risk management process.
Provide an example where you used a risk management process, either professionally or personally. Describe the outcome or result
|
|
|
|
|
CMGT/245 Week 3
Includes Everything listed for Week 3! A+ Work!
Individual: Backup and Recovery
Includes Option #1
Includes Option #2
Complete the lab "Backup and Recovery" in the Practice Labs course
CompTIA Security+.
Capture screenshots during the final step of each lab and place in a
Microsoft® Word document.
After completing the lab assignments this week, reflect on the issues
you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes
the following as applicable:
• Any issues you encountered while completing the lab
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of
network vulnerabilities in order to help protect other networks
• A description of the screenshots from each lab and what was done
Note: All references need to adhere to APA citation guidelines.
Submit your assignment using the Assignment Files tab.
Individual: Security Risk Review/Contingency Plan
Includes Presentation #1 with Speaker Notes
Includes Presentation #2 with Speaker Notes
Includes Presentation #3 with Speaker Notes
Includes Presentatino #4 with Speaker Notes
Ben's business is located in an area that is prone to floods and power
disruptions.
Leveraging your Week Three Learning Team collaborative discussion, "Information Security Risk Review/ Assessment and Business
Continuity," create a 10- to 12-slide media-rich Microsoft® PowerPoint®
presentation with speaker notes that explains the following:
• The key elements to include in a plan that will help ensure that Ben
will be able to continue to service his customers following a flood
• The key items to consider when creating a contingency plan in the
event the offsite data backup becomes unavailable
• The key aspects of implementing such a plan
Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile
your PowerPoint® presentation slides from each week's individual
assignment to create your final presentation.
Submit your presentation using the Assignment Files tab.
Discussion Question: Disaster Recovery
Includes 3 Full Answers to Discussion Question
Research two or three current articles regarding disaster recovery for businesses.
Discuss the purpose of disaster recovery and what concepts/terms relate to it. What components should a disaster recovery plan include?
Discussion Question: Proactive Planning and Organization
Includes 2 Full Answers to Discussion Question
Discuss the elements of disaster planning that are key to success in disaster recovery. What types of roles and responsibilities are needed on the escalation management teams, systems engineering teams, recovery teams, and disaster management teams? What are the advantages of being proactive in planning for a disaster?
|
|
|
|
|
CMGT/245 Week 4
Everything listed for Week 4 is Included in Purchase! A+ Work!
Individual: Information Security Policy – Access Controls, Authorization,
and Authentication
Instructions:
Based on your Week Four Learning Team collaborative discussion, "Access Control & Data Protection," create a 4- to 5-slide media-rich
Microsoft® PowerPoint® presentation with speaker notes that explains
the following:
• The benefits of implementing access controls for Ben's office
• The ways you can use authorization and authentication to protect the
company's data
• How the use of temporary employees can make data vulnerable to
social engineering attacks
• Methods to mitigate social engineering threats and damage
This media-rich presentations should include multimedia such as
graphics, pictures, video clips, or audio.
Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile
your PowerPoint® presentation slides from each week's individual
assignment to create your final presentation.
Submit your assignment using the Assignment Files tab.
Discussion Question: Authenticate, Authorize, and Access
Includes 3 Full Answers to Discussion Question
Research identification and authorization, comparing and contrasting their strengths and weaknesses.
Describe the reasons why an IT group might create role-related access limitations related to reading data, editing content, or executing certain programs on a server.
Discussion Question: Facing the Threat of Social Engineering
Includes 3 Full Answers to Discussion Question
After reading a story on a popular website describing how a social engineer defrauded a business of four million dollars, an executive approaches you to discuss defending against social engineering tactics.
Explain how you would help the organization develop a strategy to defend against attacks from in-person interactions, through email, through social media, and by phone.
|
|
|
|
|
CMGT/245 Week 5
Everything listed for Week 5 is Included in Purchase! A+ Work!
Individual: Security Policy Presentation: Final Project
Includes PowerPoint presentation #1
Includes PowerPoint presentation #2
Includes PowerPoint presentation #3
Part 1:
Recently, Ben determined that Wi-Fi would help workers at the
company so they could move around the design stations and not have
to be wired to a specific network connection. He is also interested in
using cloud-based technologies to further increase the company's
productivity.
Leveraging your Week Five Learning Team collaborative discussion, "Security Control Policies," create 3- to 4-slide media-rich Microsoft®
PowerPoint® presentation with speaker notes that outlines the outside
service provider policy section of the Information Security Policy.Include
considerations for controlling outside service provider risks, including
cloud services. Be sure to explain the following:
• Potential issues related to wireless security
• The advantages and disadvantages of cloud technologies
• The risks and ways to reduce them
Part 2:
Compile all sections of the Information Security Policy presentation.
This should include all parts of the policy from Weeks Two through
Five. Be sure to incorporate feedback received from the instructor, and
add one Title slide, one Agenda slide, one Conclusion slide, reference
slide(s), and include the appropriate appendices. The total presentation
should be 30 to 35 slides.
Write a 1- to 2-page executive summary that you could provide as a
handout summarizing the key findings of your presentation.
Note: All references need to adhere to APA citation guidelines.
Submit your assignment using the Assignment Files tab.
CMGT/245 Week 5 Discussion Questions
Discussion Question: Security Control Policies
Includes 3 Full Answers to Discussion Question
Research the challenges related to cloud security when data crosses country borders.
Discuss any concerns and potential benefits of storage outside of a company's home country
Discussion Question: Application Security
Includes 3 Full Answers to Discussion Question
Research the most common methods that hackers use to get past authentication protocols and what can be done to prevent their negative impacts.
Discuss ways to detect "man in the middle" attacks and determine whether data has been altered.
|