CST 630 Education is Power/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CST 630 Education is Power/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR). You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization. Click the following to view the data-flow diagram: [diagram and report] Include the following areas in this portion of the SAR: a. Security requirements and goals for the preliminary security baseline activity. – PowerPoint PPT presentation

Number of Views:4

less

Transcript and Presenter's Notes

Title: CST 630 Education is Power/newtonhelp.com


1
CST 630 Education is Power/newtonhelp.com
2
CST 630 Education is Power/newtonhelp.com
  • CST 630 Project 1Risk, Threat, and Vulnerability
    Management
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Project 1
  • Step 1 Conduct a Security Analysis Baseline
  • In the first step of the project, you will
    conduct a security analysis baseline of the IT
    systems, which will include a data-flow diagram
    of connections and endpoints, and all types of
    access points, including

3
CST 630 Education is Power/newtonhelp.com
  • CST 630 Project 2 Incident Response
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Project 2
  • Step 1 Develop a Wireless and BYOD Security Plan
  • Since the company you work for has instituted a
    bring your own device (BYOD) policy, security
    attitudes have been lax and all sorts of devices,
    authorized and unauthorized, have been found
    connected to

4
CST 630 Education is Power/newtonhelp.com
  • CST 630 Project 3 Enterprise Network Security
  • For more course tutorials visit
  • www.newtonhelp.com 
  •  
  • Project 3
  • Step 1 Conduct a Policy Gap Analysis
  • As you begin Step 1 of your system security
    report on cybersecurity for mergers and
    acquisitions, keep in mind that the networks of
    companies going through an MA can be subject to
    cyberattack. As you work through this step and
    the others, keep these questions in mind

5
CST 630 Education is Power/newtonhelp.com
  • CST 630 Project 4Secure Videoconferencing
    Communications 
  • For more course tutorials visit
  • www.newtonhelp.com
  • Project 4
  • Step 1 Develop Functional Requirements for
    Videoconferencing
  • The first step in your proposal for a secure
    videoconferencing system is to develop a set of
    functional requirements for videoconferencing
    that you believe the media company will nee based
    on its geographic dispersion and business needs.

6
CST 630 Education is Power/newtonhelp.com
  •  
  • CST 630 Project 5 Data Loss Prevention (21 Pages
    10 slides lab report)
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CST 630 Project 5 Data Loss Prevention (21 Pages
    10 slides lab report)

7
CST 630 Education is Power/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com