advanced |
CYB/110 Foundations of Security |
||
Or you may purchase tutorials by the Week below. |
||
CYB/110 Week 1Everything listed for Week 1 is included in purchase!!
Get ALL Week 1 Assignments for one LOW Price!
Apply: Signature Assignment: Threats to Confidentiality, Integrity, and Availability Includes Option #1 Includes Option #2 Includes Option #3 Many different threats can arise to the confidentiality, integrity and availability of data-at-rest, data-in-transit, and processing. Some threats affect only 1 of these security risks (like confidentiality only), and other threats affect more than1 or even all these risks. Create a 1 -to 2-page table in Microsoft Word, listing a minimum of 6 threats using the column headers and details below:
Within your table
Include a short paragraph that highlights 2 access control techniques or policies that enforce security Cite at least 2 resources to support your assignment Format your assignment according to APA guidelines. Submit your assignment.
WEEK 1 LABS INCLUDED (with Screenshots): Practice Labs: CompTIA Security+
CYB 110 Week 1 Discussion - Data Breach Respond to the following in a minimum of 175 words.
|
||
CYB/110 Week 2Everything listed for Week 2 is included in purchase!!
Get ALL Week 2 Assignments for one LOW Price!
Wk 2 Apply Malware Attacks Includes Option #1 A+ Work! Includes Option #2 A+ Work! Includes Option #3 A+ Work! Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams, all of which make it easy to follow troubleshooting instructions. Outline a 2- to 3-page playbook in which a malware attack of your choice occurs. Complete the following in your outline: • Provide details of the malware. • Identify the exploited vulnerability and its attack vector • Analyze the vulnerability to determine 2 risks of this malware. • Outline step-by-step instructions on how to resolve the malware attack. Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines. Note: You will use content from your Week 2 assignment as part of the Signature Assignment you will submit in Week 3. Cite at least 2 resources to support your assignment. Format your assignment according to APA guidelines. Submit your Assignment.
CYB/110 WK2 LABS (with Screenshots) INCLUDED: Practice Labs: Threats and Compliance
Week 2 Discussion - Antivirus Software Emma won a laptop at her high school science fair. The laptop does not have antivirus software installed on it so Emma must purchase one. She’ll be using the laptop for college applications, schoolwork, and hopefully next year as a college freshman. Respond to the following in a minimum of 175 words:
|
||
CYB/110 Week 3Everything listed for Week 3 is included in purchase!! Get ALL Assignments for one LOW Price! CYB 110 Apply Week 3 Online Interactions Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions. Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. Cite at least 2 resources to support your assignment. Format your assignment according to APA guidelines. CYB/110 WK3 LABS (with Screenshots) INCLUDED: Microsoft Security LABS - Understand Internet Security Week 3 CompTIA Security+ LAB Practice Labs: Microsoft Security Fundamentals
Week 3 Discussion - Online Email Attachments Richard received an email from a person claiming to be his childhood friend, Kate. The email address is unknown to Richard, but the subject says that it is Kate’s new email address. It also has an attachment, which according to the subject, is a childhood picture of them.
|
||
CYB/110 Week 4Everything listed for Week 4 is included in purchase!!
Get ALL Assignments for one LOW Price!
Apply: Mobile Security Includes Poster #1 Includes Poster #2 Includes Poster #3 Includes Poster #4 Includes Poster #5 Plus includes extra blank posters you can use!Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches. Create a visual poster or infographic to display in the company’s break room. Include the following information:
Week 4 Discussion - Security Measures Shereen works as an executive reporter for news todays. The assignment in which she is currently working on will expose a major cover up at the mayors office. All the information Shereen has gathered is stored on her phone. She is worried that someone may attempt to steal the phone in order to stop the story.
Respond to the following in a minimum of 175 words. What are two security measures Shereen can take to secure her mobile device? Describe how to setup these security measures.
|
||
CYB/110 Week 5Everything listed for Week 5 is included in purchase!!
Get ALL Assignments for one LOW Price!
Apply: Signature Assignment: Backup Policies NOTE: Only the Week5 Section of the Playbook is included in the Week 5 tutorials. Includes Playbook Option #1 Includes Playbook Option #2 Includes Playbook Option #3 Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.
Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. Format your assignment according to APA guidelines. Submit your completed Playbook for this assignment.
Practice Labs: Compliance – Backup Execution and Frequency Screenshot included
Discussion Question: CSCU Exam The Certified Secure Computer User (CSCU) exam is designed for those who use the internet for work, study, or play. Respond to the following in a minimum of 175 words: • How could this industry certification benefit you and your personal career goals? • What are two other resources you can use to prepare for this exam besides the materials provided in this course?
|