CYB 110 Pride In Excellence/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 110 Pride In Excellence/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA – PowerPoint PPT presentation

Number of Views:11
Slides: 35
Provided by: frangipanimag29

less

Transcript and Presenter's Notes

Title: CYB 110 Pride In Excellence/newtonhelp.com


1
CYB 110 Pride In Excellence/newtonhelp.com
2
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 All Assignments   For more course
tutorials visit www.newtonhelp.com       CYB 110
Week 1 Individual Protecting Data CYB 110 Week 1
Individual Security Policies CYB 110 Week 1
Individual Risk Management Framework and CIA
3
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 All Discussion (New Syllabus)   For more
course tutorials visit www.newtonhelp.com     CYB
110 Week 1 Discussion Data breach (New
Syllabus)   CYB 110 Week 2 Discussion Antivirus
Software (New Syllabus)  
4
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Apply Week 1 Threats to Confidentiality,
Integrity, and Availability (New Syllabus)   For
more course tutorials visit www.newtonhelp.com    
Threats to Confidentiality, Integrity, and
Availability   Assignment Content There are many
different threats to the confidentiality,
integrity and availability of data-at-rest,
data-in-transit, and
5
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Apply Week 2 Malware Attacks (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     Wk 2 Apply Malware
Attacks   Assignment Content Playbooks, sometimes
known as Standing Operating Procedures (SOP) or
runbooks, are used for troubleshooting common
issues. They are often created by a team of
employees who are trained to manage security
issues.
6
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Apply Week 3 Online Interactions (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     CYB 110 Apply Week 3
Online Interactions   Assignment Content Online
interactions pose a threat to all servers. There
are risks that occur when employees use social
networking web browsing and email
7
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Apply Week 4 Mobile Security (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     Mobile devices are
always in the workplace and being used for both
personal and company business. You have been
asked to create an informative poster to display
throughout the office that highlights ways to
secure mobile
8
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Apply Week 5 Backup Policies (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     Securing company
data is not as simple as backing up to another
hard drive. It is important to have backup tools,
processes, and policies for both business
continuity and disaster recovery plans. In the
final section of your playbook, create a 3- to
4-page outline of backup policies for when the
data center is inaccessible.
9
CYB 110 Pride In Excellence/newtonhelp.com
CYB-110-Entire-Course-(New-Syllabus) For more
course tutorials visit www.newtonhelp.com     CYB
110 Week 1 Discussion Data breach (New
Syllabus)   CYB 110 Apply Week 1 Threats to
Confidentiality, Integrity, and Availability (New
Syllabus)
10
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 1 Discussion Data breach (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words.   In case of
a suspected data breach, what course of action
should a chief information security officer
(CISO) take?
11
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 1 Discussion Secure
Environment   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words  Research
Playbook/Runbooks and the role they play in
security.   Discuss how a Playbook/Runbook
relates to creating a secure environment and why
policies are important for
12
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 1 Individual Protecting Data   For
more course tutorials visit www.newtonhelp.com    
  CYB 110 Week 1 Individual Protecting
Data There are many different threats to the
confidentiality, integrity, and availability of
data-at-rest. Some threats
13
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 1 Individual Risk Management
Framework and CIA   For more course tutorials
visit www.newtonhelp.com       Individual Risk
Management Framework and CIA In Ch. 1,
"Introduction to Information Security," of
Elementary Information Security, you read about
National Institute of Standards and Technology
(NIST) Risk Management Framework (RMF) and how it
expands on the
14
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 1 Individual Security Policies   For
more course tutorials visit www.newtonhelp.com    
  CYB 110 Week 1 Individual Security
Policies You have been hired as a security
specialist by a company to provide methods and
recommendations to create a more secure
environment for company data.
15
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 1 Practice Practicelabs Microsoft
Security Fundamentals (New Syllabus)   For more
course tutorials visit www.newtonhelp.com     Micr
osoft Security Fundamentals   cyb 110 week 1
practice practicelabs microsoft security
fundamentals (new syllabus)  
16
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 2 Discussion Antivirus Software (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words.   Emma won a
laptop at her high school science fair. The
laptop does not have antivirus software installed
on it so
17
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 2 Discussion Malware   For more
course tutorials visit www.newtonhelp.com     Resp
ond to the following in a minimum of 175
words    Research different types of malware,
looking at specific examples and how they
affected an organization. List examples of
malware that pose threats to individuals or
companies and their attack vectors.  
18
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 2 Individual Configuring Anti-Virus
Software   For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 2
Individual Configuring Anti-Virus Software You
are a security analyst at a large Security
Operations Center (SOC). Malware infections have
noticeably
19
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 2 Individual Run/Playbook Part 1
Malware   For more course tutorials
visit www.newtonhelp.com       Individual
Run/Playbook Part 1 Malware Create the first
section of your Playbook/Runbook. This week you
researched malware, attack vectors, and how they
are related to cybersecurity.
20
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 2 Individual Securing an Operating
System   For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 2
Individual Securing an Operating System You are a
security administrator responsible for providing
secure configuration requirements for new laptop
21
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 3 Discussion Online Email
Attachments (New Syllabus)   For more course
tutorials visit www.newtonhelp.com     Respond to
the following in a minimum of 175
words.   Richard received an email from a person
claiming to be his childhood friend, Kate. The
email address is unknown to Richard, but the
subject says that it is Kates new email address.
It also has an attachment, which according to
22
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 3 Discussion Online Interaction
Risks   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words    Retail
stores often directly interact with customers
online. Staff can also indirectly interact with
the public online through their private social
media. Discuss risks online interactions pose to
a company. How can companies ensure
23
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security   For more course
tutorials visit www.newtonhelp.com       Individua
l Playbook/Runbook Part 2 Social Network
Security Add a 1- to 2-page section to your
Playbook/Runbook that includes the following
List of information and data employees are
not to place online
24
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network   For more course
tutorials visit www.newtonhelp.com       CYB 110
Week 3 Individual Social Network Security
Configuring a Social Network Your company
encourages its employees to interact with the
corporate Facebook page as a way to promote brand
25
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 4 Discussion Bring Your Own
Device For more course tutorials
visit www.newtonhelp.com     Your company is
thinking of introducing a Bring Your Own Device
(BYOD) policy. You have been tasked with
assessing the risks associated with this
implementation, including how to manage malware,
data leakage, and access control.
26
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 4 Discussion Security Measures (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     shereen works as an
executive reporter for news todays. the
assignment in which she is currently working on
will expose a major cover up at the mayors
office. all the information shereen has gathered
is stored on her phone, She is worried that
someone may attempt to steal the phone in order
to stop the story
27
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 4 Individual Configuring Security on
Mobile Devices   For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 4
Individual Configuring Security on Mobile
Devices Management approved a pilot program in
which a controlled group of users can access
certain company data from
28
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines   For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 4
Individual Runbook/Playbook Part 3 Network,
Mobile Device, and Cloud Services
Guidelines Individual Runbook/Playbook Part 3
Network, Mobile Device, an
29
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 5 Discussion CSCU Exam (New
Syllabus)   For more course tutorials
visit www.newtonhelp.com     The Certified Secure
Computer User (CSCU) exam is designed for those
who use the internet for work, study, or
play. Respond to the following in a minimum of
175 words  
30
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 5 Discussion Data Backup
Procedures   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words  The
university you work for has several different
functional areas that maintain student
information and data (e.g.,
31
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 5 Individual Configure Backup
Settings   For more course tutorials
visit www.newtonhelp.com       Individual
Configure Backup Settings You want to ensure your
personal computer is set to save data on a daily
basis. Using OneDrive configure a personal
computer to save and maintain data.
32
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 5 Individual Disaster Recovery and
Business Continuity Plan   For more course
tutorials visit www.newtonhelp.com       Individua
l Disaster Recovery and Business Continuity
Plan You work for a multi-state company with
three sites in three different states, 1,000
employees, an ERP application with a backend
database, and two datacenters.
33
CYB 110 Pride In Excellence/newtonhelp.com
CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines   For more course
tutorials visit www.newtonhelp.com       Individua
l Playbook/Runbook Part 4 Secure Data Backup
Guidelines NOTE Only Part 4 is Included - Part
1, 2, 3 Not Included. Add a 1- to 2-page
section to your Playbook/Runbook. Outline
guideline policies and procedures to back up and s
34
CYB 110 Pride In Excellence/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com