240 likes | 250 Views
For more course tutorials visit<br>www.tutorialrank.com<br><br>CYB 100 Week 1 Organizational Data Flow<br> <br>CYB 100 Week 1 Protocols Lab<br> <br>CYB 100 Week 2 Individual Cyber security Laws<br> <br>
E N D
CYB 100 All Assignments For more course tutorials visit www.tutorialrank.com CYB 100 Week 1 Organizational Data Flow CYB 100 Week 1 Protocols Lab CYB 100 Week 2 Individual Cyber security Laws CYB 100 Week 3 Assignment Conflict CYB 100 Week 3 Individual Geopolitics In Key Nations CYB 100 Week 4 Individual Final Project Part 1 Paper And Storyboard CYB 100 Week 5 Cloud Storage-as-a-Service Resource Lab CYB 100 Week 5 Final part 2 Cloud Storage as a Service Provider
CYB 100 Assignment Week 1 Defining the Cyber Domain CYB 100 Assignment Week 2 Legal, Ethical, and Privacy Issues in the Cyber Domain CYB 100 Assignment Week 3 Security Planning and Risk Management CYB 100 Assignment Week 4 Intrusion Detection CYB 100 Assignment Week 5 Roles in the Cyber Domain ============================================== CYB 100 Assignment Week 1 Defining the Cyber Domain For more course tutorials visit www.tutorialrank.com
Individual: Defining the Cyber Domain Instructions: The Chief Information Officer (CIO) of the organization you chose in the Week 1 discussion, "Key Components of an Information System as Related to the Cyber Domain," is looking for more information on the cyber domain in hopes of determining the organization's cybersecurity needs. As a cyber-security consultant, you believe you can provide the CIO with the information he needs. Using Microsoft® Word, write a 1- to 2-page communication to the CIO of the organization. Provide an overview of the following in your letter: • A definition of the cyber domain and its key components or aspects. The cyber domain encompasses cybersecurity, a discipline that involves the following: • Securing computer information, communications systems, networks, infrastructures, assets • Protecting them against damage, unauthorized use, modification, exploitation
• The components of an information system, elaborating on the similarities to the cyber domain • An approach to implementing information security for the organization you chose and how that approach could be expanded to the larger cyber domain • The systems development life cycle compared to the cyber domain life cycle • The components of the threat environment for the organization you chose, including an argument that a threat to the organization is also a threat to the larger domain Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. Supporting Material: Assignment Grading Guide ============================================== CYB 100 Assignment Week 2 Legal, Ethical, and Privacy Issues in the Cyber Domain For more course tutorials visit
www.tutorialrank.com Individual: Legal, Ethical, and Privacy Issues in the Cyber Domain Instructions: The CIO of the organization you chose read your letter and would like to meet with you to discuss the legal, ethical, and privacy issues governing the cyber domain and directly impacting the organization. Research the legal, ethical, and privacy issues as they relate to your chosen organization and the broader cyber domain. Using Microsoft® PowerPoint®, prepare a 12- to 14-slide, media-rich presentation for the CIO that includes the following: • Title slide • At least 2 fundamental U.S. laws that impact the organization and the cyber domain • At least 3 compliance laws and regulations governing the cyber domain and impacting the organization
• At least 4 organizational security issues • At least 3 security technologies used to comply with laws and that support ethics in information security for the organization Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. ============================================== CYB 100 Assignment Week 3 Security Planning and Risk Management For more course tutorials visit www.tutorialrank.com Individual: Security Planning and Risk Management
Instructions: Resource: Security Planning and Risk Management Template The CIO of the organization you chose is ready for you to take a look at the organization's potential vulnerabilities and threats. Complete the 1.5- to 2-page Security Planning and Risk Management Template. Include the following: • Considering the aspects or components of the cyber domain, list potential vulnerabilities or threats facing the organization. • Give a description of the risk each vulnerability or threat would have on the organization in terms of its people, network, data, or reputation. • Explain each risk's impact on the organization. • Provide a defined mitigation for each vulnerability, such as an incident response plan, disaster recovery plan, or business continuity plan. Or, give a defined reason why this vulnerability or threat would not be mitigated, such as the use of a different risk control strategy.
Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. Supporting Material: Assignment Grading Guide ============================================== CYB 100 Assignment Week 4 Intrusion Detection For more course tutorials visit www.tutorialrank.com Individual: Intrusion Detection Instructions: After reviewing your latest submission, the CIO has found some areas of concern and would like you to provide a little clarity on one subject. He is meeting with upper management to persuade them to purchase a new suite of intrusion detection software for the network. Currently, the organization has antivirus software and uses firewalls. Provide
justification for adding intrusion detection software (IDS), as well. Research various IDS that would benefit the company. Create a 2-page table for the CIO to share with upper management. Include the following: • Reasons why IDS would benefit the company and the larger cyber Domain • Descriptions of the categories and models of intrusion detection and prevention systems • A description of the function of antivirus software, firewalls, and IDS • Examples of commercial software that could provide the solution Include citations as necessary in APA format. Click the Assignment Files tab to submit your assignment. Supporting Material: Assignment Grading Guide ==============================================
CYB 100 Assignment Week 5 Roles in the Cyber Domain For more course tutorials visit www.tutorialrank.com Individual: Roles in the Cyber Domain Instructions: The presentation was a success, and the CIO of the organization you choose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the intrusion detection software (IDS) solution. Therefore, you will provide him with the following information to consider in his planning: Part A: Create 1- to 1.5-page summary including the following: • The number of additional employees necessary to rollout and support an IDS desktop solution • An explanation as to how individuals work with the existing desktop support and malware teams
• The job title for those who normally perform rollout and support functions for the IDS desktop solution • An outline of the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution Part B: Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart showing the following: • The job titles provided in your summary and how they fit in with the existing cybersecurity team • A list of the industry certifications the new IDS rollout-and-support function employees should have or can work toward Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. ==============================================
CYB 100 Week 1 Organizational Data Flow For more course tutorials visit www.tutorialrank.com You have recently been hired as a Cybersecurity Intern with a medium- sized company that is growing very rapidly. The Chief Information Officer (CIO) is trying to understand the importance of the Cyber Domain that the Chief Information Security Officer (CISO) keeps talking about when they discuss expanding the business. The CISO has asked you to write an email to the CIO that explains the scope of the Cyber Domain, common assets of the Cyber Domain, and important milestones in its development. Write a 350-to 700-word email using Microsoft® Word to the CIO explaining the following: Clearly define the term "Cyber Domain" Accurately describe the maritime, space, and physical domains Accurately describe three milestones in the development of communication and information technology, and security Correctly describe the impact cloud computing has had on the Cyber Domain List at least four high value assets that are common to information and communication systems, networks, the cloud, and infrastructure
Make sure rules of grammar and usage are followed, including spelling and punctuation. ============================================== CYB 100 Week 1 Protocols Lab For more course tutorials visit www.tutorialrank.com Cyberspace and the Internet (the Web) are closely related. The term "Internet" refers to a series of protocols which represent actual methods of access and transfer of digital assets. Most internet users are familiar with the protocol of HTTP and the multimedia part of the Web called the World Wide Web (WWW). Other protocols are included in the TCP/IP protocol suite. IT and Web specialists are aware of these other protocols and their uses. Knowledge of these protocols is important to recognizing risks in cyberspace. This lab will employ one of these additional protocols and demonstrate the "reach" and scope of Cybersecurity and the Cyber Domain. An internet-connected browser enabled device is required for this lab. Complete the following:
1.Research HTTP, TCP/IP, and FTP protocols and accurately describe each. 2.Launch a browser and go to http://ftp.swfwmd.state.fl.us/pub/out/ 3.Sort on "Last Modified" oWhat is the date of the oldest file? 4.Sort on the "NAME" 5.What is the name of the first file? 6.What is the "TITLE" found on the opened 103919.PDF image when viewed locally with Acrobat Reader? 7.Is the map of Southwest Florida? 8.What function does the FTP protocol do? 9.What authorization was required to access the 103929.PDF file? 10. What controls the use of this file? 11. How many miles/kilometers is the Server from you? 12. Is there a risk involved related to the ease of access to such files? Write a 90- to 175-word Question and Answer paper using Microsoft® Word that addresses each of the questions. Submit your assignment using the Assignment Files tab. ==============================================
CYB 100 Week 2 Individual Cyber security Laws For more course tutorials visit www.tutorialrank.com The U.S. has in place many laws related to information security, computer security, and internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information. Write a 2-page paper using Microsoft® Word that answers the following questions: For two laws from Table 3.1 in Principles of Information Security, state the overall intent of each law. For example what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do? Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below: oComputer Fraud and Abuse Act oNational Information Infrastructure Protection Act oSarbanes-Oxley Act
Having reviewed these laws and cases/complaints associated with them, completely answer each of the following: Which of these laws seemed more frequently enforced? Which of these laws have resulted in a large financial impact to a business? Which of these have imposed a strict punitive damage (e.g., someone being convicted of fraud)? According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement? Accurately explain if the ethical confidentiality of all private information is assured by the three laws Based on your Learning Team discussion, list at least two conflicts faced by U.S. cloud service providers when providing services globally. Use APA citation formatting in all work submission. Follow rules of grammar and usage, including spelling and punctuation. ============================================== CYB 100 Week 3 Assignment Conflict For more course tutorials visit www.tutorialrank.com
Research a current domestic or international conflict in the cyber domain. As a way of checking for your understanding of the nature of conflict as described in the video,write a 1-page methodology for resolving the conflict using Microsoft® Word that addresses the following: Identify the reason for the conflict and the opposing forces Accurately identify the key political figures that impact the outcome or resolution of the conflict If you were involved with the resolution of the conflict, what style of conflict resolution would you use--the competing shark, the collaborating owl, the avoiding turtle, the accommodating teddy bear, or the compromising fox--and why? Do you think in our current political environment we may take the easy way out and try to sweep the conflict under the rug? There is one simple widely used method to resolve common conflict that goes by the acronym DESC that stands for Describe, Express, Specify, Consequences. Do you think this method could be used to resolve the conflict you identified? Do you think methods for conflict resolution in the workplace are the same as geological conflicts? Why or why not? Submit your assignment using the Assignment Files tab. ==============================================
CYB 100 Week 3 Individual Geopolitics In Key Nations For more course tutorials visit www.tutorialrank.com Create a 1-page 4 row by 3 column table in Microsoft® Word that depicts laws for the U.S. and two other key nations in the strategic, tactical, and operational areas of cybersecurity. Provide a brief description of the law for each category of cybersecurity provided. The table column headings could be U.S., Russia, and China, for instance (or two other key nations of your choice). The row labels are Strategical, Tactical, and Operational. Create a Microsoft® PowerPoint® presentation containing 8 slides, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide. Scenario: You are attending the company board meeting with your supervisor, the VP of Information Technology. The U.S.-based company is considering expanding into 100 countries worldwide. You will be presenting to the Board of Directors so they can understand the cyber threat each key nation poses to the company so they can make a more informed decision on how best to achieve international growth. Your task is to: Accurately define "geopolitics"
Identify the geopolitics of key nations (include at a minimum: U.S., China, Russia, Israel, and Iran) Accurately describe the differences of each key nation's political stance on cyber war Describe past international cyber conflicts and the resulting impact to the economy of each nation involved Accurately define "cyber-attack" State the impact of cyber-attacks on U.S. companies All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used. ============================================== CYB 100 Week 4 Individual Final Project Part 1 Paper And Storyboard For more course tutorials visit www.tutorialrank.com Write a 350-word FAQ document using Microsoft® Word in response to the following:
Scenario One: You are preparing for a new company-wide project to implement cloud technology. In preparation for the project rollout, the VP of Information Technology has asked you to prepare a FAQ document describing cyberspace and its associated complexities for all staff so they understand cyberspace, and cloud technology. The U.S.- based company has 100,000 staff members and offices in 100 countries. Your task is to, in the form of an FAQ, provide answers to the following: What are the definition of cyberspace, and the maritime, space, and physical domains? Provide a concise description of cyberspace and the maritime, space, and physical domains How do international laws affect citizens and companies in the U.S.? Accurately describe how international laws affect citizens and companies in the U.S. How do political elements within the U.S. affect cyber security? Accurately describe how political elements within the U.S. can affect cyber security Why is cyber security so complex in cloud technology? Concisely explain the complexities of cyber security in cloud technology What advantages can cloud technology offer to businesses? Describe at least two advantages cloud technology can offer businesses Scenario Two: You have recently been hired as a Cybersecurity Intern with a medium size company that has been growing very rapidly. The company supports outreach to the community and has set up a forum to help high school students understand important concepts in security.
Your boss has asked you to set up a storyboard that will be used to present to the students to highlight the differences between espionage, intelligence gathering, and cyber warfare. He also wants you to help them understand the physical assets of the Cyber Domain. If you are successful with the storyboard, your boss plans to turn this into an infomercial. Develop a 8-slide/panel storyboard document using Microsoft® Word or PowerPoint®. Your storyboard should: Accurately depict the differences between espionage, intelligence gathering, and cyber warfare at a level that high school students can relate to Accurately describe the influence the military has had on intelligence gathering, cyber warfare, and physical assets Provide a complete timeline of a recent incident involving personal privacy including the nature of the attack, and providing insight into the risks of conducting business in cyberspace Enumerate at least five physical assets of the Cyber Domain, including an explanation of why you included the assets Examine where we are today in the areas of espionage, intelligence gathering, cyber warfare, and physical assets, and offer a prediction of the future given your current perspective All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.
============================================== CYB 100 Week 5 Cloud Storage-as-a-Service Resource Lab For more course tutorials visit www.tutorialrank.com Write a 1-page informal paper using Microsoft® Word that answers the following questions: Accurately define Cloud Storage-as-a-Service Accurately describe how to get to OneDrive® from a web browser Describe in a set-by-step manner how to sync files What is a guest link? List three ways you can control access in OneDrive® Describe two vulnerabilities you think OneDrive® has ==============================================
CYB 100 Week 5 Final part 2 Cloud Storage as a Service Provider For more course tutorials visit www.tutorialrank.com Create a Microsoft® PowerPoint® presentation containing eight slides, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide. Scenario: You are preparing for a new company-wide project to provide each employee with a personal cloud storage account. The VP of Information Technology has asked you to research solutions for the organization and make sure the CSaaS provider encrypts data in transit and at rest. The U.S.-based company has 100,000 staff members and offices in 100 countries. You will be preparing a presentation of products to present to the company's Information Technology Committee so they can understand the technology, security features, and associated cyber risk. Your task is to: Research Cloud Storage-as-a-Service (CSaaS) providers Briefly define the technology involved to implement a cloud-based technology such as CSaaS Briefly describe the registration and authentication process for one of the providers
Correctly identify the encryption technology used both in transit and in storage for one provider Correctly identify the ethics and privacy policies of one CSaaS provider All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used. ==============================================