1 / 15

CMGT 431 educational explore / snaptutorial.com

CMGT 431 Week 4 Lab<br><br> <br><br>CMGT 431 Week 5 Lab<br><br>CMGT 431 Week 1 Encryption Methodologies to Protect an Organizationu2019s Data Paper<br><br> <br><br>CMGT 431 Week 1 Discussion Classifying an Organizationu2019s Sensitive Data<br>

Download Presentation

CMGT 431 educational explore / snaptutorial.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CMGT 431 educational explore / snaptutorial.com

  2. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Entire Course (New Syllabus) • http://www.snaptutorial.com/CMGT%20431/product-35169-CMGT-431-All-Assignments • CMGT 431 Week 4 Lab • CMGT 431 Week 5 Lab • CMGT 431 Week 1 Encryption Methodologies to Protect an Organization’s Data Paper • CMGT 431 Week 1 Discussion Classifying an Organization’s Sensitive Data

  3. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 1 Discussion Classifying an Organization’s Sensitive Data • http://www.snaptutorial.com/CMGT%20431/product-39775-CMGT-431-Week-1-Discussion-Classifying-an-Organizations-Sensitive-Data • Respond to the following in a minimum of 175 words: • Organizations need to know the value of their data to find the best way to protect it. The data must be categorized according to the organization’s level of concern for confidentiality, integrity, and availability. The potential impact on assets and operations should be known in case data, systems, and/or networks are compromised (through unauthorized access, use, disclosure, disruption, modification, or destruction). • Choose an organization that you are familiar with to study throughout this course. You can use your own employer or another organization. I do encourage you to choose one that you have some experience with as there are significant differences and requirements between the different vertical markets.

  4. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 1 Encryption Methodologies to Protect an Organization’s Data Paper • http://www.snaptutorial.com/CMGT%20431/product-39773-CMGT-431-Week-1-Encryption-Methodologies-to-Protect-an-Organizations-Data-Paper • Week 1 Encryption Methodologies to Protect an Organization’s Data Paper • Assignment Content • Companies are susceptible to losing sensitive data in many ways, including cyber-attackers and human errors, so it is important for organizations to properly protect their data and network. • In this assignment, you will create an executive summary of your organization's Security Policy for your CSO's (Chief Security Officer) review. Use the organization you chose in the discussion Classifying an Organization's Sensitive Data to frame the recommendations and information that needs to be protected. For example, a company in the Healthcare industry will have patient information that falls under the HIPAA regulations.

  5. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 2 Discussion Secure Network Architecture • http://www.snaptutorial.com/CMGT%20431/product-39774-CMGT-431-Week-2-Discussion-Secure-Network-Architecture • Respond to the following in a minimum of 175 words: • It has been stated that an organization’s success securing its assets builds on top of business infrastructure, which includes the appropriate policies, procedures, and processes. Typically this would include business and operational processes, physical and virtual security components and last but by no means least, a secure systems and network infrastructure. Pick one of these elements and share with the class some of your research.

  6. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 2 Security Vulnerability Report • http://www.snaptutorial.com/CMGT%20431/product-39776-CMGT-431-Week-2-Security-Vulnerability-Report • Individual: Security Vulnerability Report • A security vulnerability report identifies the areas of the organization that are at risk of losing data, outages, etc. Typically, organizations categorize the report to focus on specific areas and highlight the level of risk per area. Based on the vulnerability report, organizations are able to plan appropriately for budgeting and resource improvements. Write a 2½- to 3 ½-page security vulnerability report in Microsoft Word based on the organization you chose in Week 1. An internal review of your organization was previously conducted and found the following vulnerabilities:

  7. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 3 Discussion Authentication Methodologies • http://www.snaptutorial.com/CMGT%20431/product-39777-CMGT-431-Week-3-Discussion-Authentication-Methodologies • Respond to the following in a minimum of 175 words: • Authentication ensures only authorized users are allowed into an organization’s network. As threats become more sophisticated, it is critical to have strong authentication in place from the policy, process, and technology perspective. Research identification and authorization, comparing and contrasting their strengths and weaknesses.

  8. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 3 Individual Authentication and Authorization Methodologies Presentation • http://www.snaptutorial.com/CMGT%20431/product-39778-CMGT-431-Week-3-Individual-Authentication-and-Authorization-Methodologies-Presentation • Individual Authentication and Authorization Methodologies Presentation • Once a user is authenticated in an organization’s network, that user is authorized to access certain data based on the information security principle of least privilege. • Your CEO and CIO need options for the organization’s authentication and authorization methodologies. Recommendations should include how to mitigate the impact and risks from vulnerabilities.

  9. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 4 Discussion Audit Process • http://www.snaptutorial.com/CMGT%20431/product-39779-CMGT-431-Week-4-Discussion-Audit-Process • Respond to the following in a minimum of 175 words: • Organizations contract or hire individuals or consulting companies with specific skills to conduct internal audits. This is done to ensure their organizations are following their documented policies, procedures, and processes. In addition, federal mandates placed on organizations require continuous audits, leading organizations to contract outside auditors to work with their internal auditors and determine the health of the organization. These audits can take many forms, including financial (SOX), organizational (ISO 9001) or Security (ISO 27000, PCI DSS Compliance, etc.)

  10. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 4 Lab • http://www.snaptutorial.com/CMGT%20431/product-39786-CMGT-431-Week-4-Lab • CMGT 431 Week 4 Lab

  11. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 4 Testing and Assessment Strategies • http://www.snaptutorial.com/CMGT%20431/product-39780-CMGT-431-Week-4-Testing-and-Assessment-Strategies- • Refer to NIST SP 800-53 (Rev. 4) [https://nvd.nist.gov/800-53] for the 18 candidate security control families and associated security controls. • Security Assessment must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack. A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities.

  12. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 5 Discussion Incident Response Plan • http://www.snaptutorial.com/CMGT%20431/product-39781-CMGT-431-Week-5-Discussion-Incident-Response-Plan • Respond to the following in a minimum of 175 words: • An incident response plan (IRP) is a set of procedures to help an organization detect, respond to, and recover from security incidents. • List the roles and responsibilities that are included in an IRP. Pick one that you think is critical to the successful response for your chosen organization to a security incident and discuss it in detail on how it helps contain the threat. • .

  13. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 5 Individual Incident Response Paper • http://www.snaptutorial.com/CMGT%20431/product-39782-CMGT-431-Week-5-Individual-Incident-Response-Paper • Individual Incident Response Paper • Cyber security tools are available to organizations requiring integration of its problem management, configuration management, and incident management processes. • The CEO and CIO need you and your team to create an IRP and change management plan. These plans will help the organization choose the appropriate cyber security tool.

  14. CMGT 431 educational explore / snaptutorial.com • CMGT 431 Week 5 Lab • http://www.snaptutorial.com/CMGT%20431/product-39787-CMGT-431-Week-5-Lab • CMGT 431 Week 5 Lab

  15. CMGT 431 educational explore / snaptutorial.com

More Related