60 likes | 73 Views
For more course tutorials visit<br>www.tutorialrank.com<br><br>Resource:u202fWeek One video, "Information Security Terminology" <br><br>Using the terminology presented in the "Information Security Terminology" video, information from the textbook and online sources,u202fresearchu202fthe key components of an information system for an organization of your choosing. <br><br>
E N D
CYB 100 Week 1 Discussion Key Components of an Information System as Related to the Cyber Domain For more course tutorials visit www.tutorialrank.com Resource: Week One video, "Information Security Terminology" Using the terminology presented in the "Information Security Terminology" video, information from the textbook and online sources, research the key components of an information system for an organization of your choosing. Discuss the relationship between the key components of the information system you chose and how they relate to the cyber domain. Note: You will use this information and continue to study the organization you chose in the Week 1 discussion, "Information Security Implementation," and the Week 1 assignment, "Defining the Cyber Domain." ==============================================
CYB 100 Week 2 Discussion Legal and Ethical Issues For more course tutorials visit www.tutorialrank.com Resource: Table 3-1, "Key U.S. Laws of Interest to Information Security Professionals," in Ch. 3, "Legal, Ethical, and Professional Issues in Information Security," of Principles of Information Security Research fundamental U.S. laws, security laws, regulations, and guidelines that impact the cyber domain in The Security Laws, Regulations and Guidelines Directory on the CSO from IDG website. Discuss the laws and regulations that most impact information security professionals. Include the following in your discussion: The roles of those responsible for upholding the laws The impact of laws and regulations on the organization you chose in Week 1 How ethics and politics across various domains (space, maritime, and physical) of states and global nations differ from those in the U.S. Your experience with any of the laws and regulations
Note: You will use information from this discussion in your Week 2 assignment, "Legal, Ethical, and Privacy Issues in the Cyber Domain." Due Monday Reply to at least 2 of your classmates. Be constructive and professional in your responses. ============================================== CYB 100 Week 3 Discussion Security Planning For more course tutorials visit www.tutorialrank.com Respond to the following in a minimum of 175 words:
Resource: The following Week Three videos: "Contingency Planning" "Risk Assessment" "Risk Control" Research the potential vulnerabilities and threats faced by the organization you chose in Week 1. Discuss the steps involved in security planning for the organization. How important is risk management in the security planning process for the organization? How do the existing vulnerabilities and threats impact the importance of risk management? Note: You will use information from this discussion to complete the Week 3 assignment, "Security Planning and Risk Management." ============================================== CYB 100 Week 4 Discussion Physical Asset Controls For more course tutorials visit www.tutorialrank.com
Physical Asset Controls Respond to the following in a minimum of 175 words: Physical asset controls vary depending on where they reside. Research physical asset controls in the space, maritime (oceans, seas, bays, estuaries, islands, and coastal areas), and physical domains. Discuss physical asset controls in space, maritime, and physical domains of states and nations globally. What can you discuss from your research? Due Monday
Reply to at least 2 of your classmates. Be constructive and professional in your responses. ==============================================