160 likes | 169 Views
For more course tutorials visit<br>www.tutorialrank.com<br><br>CYB 110 Week 1 Individual Protecting Data<br> <br>CYB 110 Week 1 Individual Security Policies<br> <br>CYB 110 Week 1 Individual Risk Management Framework<br>
E N D
CYB 110 Enhance teaching / tutorialrank.com CYB 110 All Assignments For more course tutorials visit www.tutorialrank.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 1 Individual Protecting Data For more course tutorials visit www.tutorialrank.com CYB 110 Week 1 Individual Protecting Data There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks.
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 1 Individual Risk Management Framework and CIA For more course tutorials visit www.tutorialrank.com Individual Risk Management Framework and CIA In Ch. 1, "Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts.
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 1 Individual Security Policies For more course tutorials visit www.tutorialrank.com CYB 110 Week 1 Individual Security Policies You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data.
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 2 Individual Configuring Anti-Virus Software For more course tutorials visit www.tutorialrank.com CYB 110 Week 2 Individual Configuring Anti-Virus Software You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably increased, and all the impacted machines did not have updated anti-virus signatures. Your task is to set the anti-virus software to secure your company’s computers.
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 2 Individual Run/Playbook Part 1 Malware For more course tutorials visit www.tutorialrank.com Individual Run/Playbook Part 1 Malware Create the first section of your Playbook/Runbook. This week you researched malware, attack vectors, and how they are related to cybersecurity. Write a 1- to 2-page scenario in which a malware attack occurs. Include the following:
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 2 Individual Securing an Operating System For more course tutorials visit www.tutorialrank.com CYB 110 Week 2 Individual Securing an Operating System You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security For more course tutorials visit www.tutorialrank.com Individual Playbook/Runbook Part 2 Social Network Security Add a 1- to 2-page section to your Playbook/Runbook that includes the following: • List of information and data employees are not to place online • Guidelines for interacting online
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network For more course tutorials visit www.tutorialrank.com CYB 110 Week 3 Individual: Social Network Security – Configuring a Social Network Your company encourages its employees to interact with the corporate Facebook page as a way to promote brand awareness and customer engagement. Your company wants employees
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 4 Individual Configuring Security on Mobile Devices For more course tutorials visit www.tutorialrank.com CYB 110 Week 4 Individual: Configuring Security on Mobile Devices Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices instead of purchasing
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines For more course tutorials visit www.tutorialrank.com Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines Add a 1- to 2-page section to your Playbook/Runbook.
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 5 Individual Configure Backup Settings For more course tutorials visit www.tutorialrank.com Individual Configure Backup Settings You want to ensure your personal computer is set to save data on a daily basis. Using OneDrive configure a personal computer to save and maintain data.
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan For more course tutorials visit www.tutorialrank.com Individual Disaster Recovery and Business Continuity Plan You work for a multi-state company with three sites in three different states, 1,000 employees, an ERP application with a backend databas
CYB 110 Enhance teaching / tutorialrank.com CYB 110 Week 5 Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines For more course tutorials visit www.tutorialrank.com Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines NOTE: Only Part 4 is Included - Part 1, 2, & 3 Not Included.