CYB 110 Become Exceptional / newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 110 Become Exceptional / newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA CYB 110 Week 2 Individual Securing an Operating System – PowerPoint PPT presentation

Number of Views:29
Slides: 35
Provided by: king1563

less

Transcript and Presenter's Notes

Title: CYB 110 Become Exceptional / newtonhelp.com


1
CYB 110 Become Exceptional / newtonhelp.com
2
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 All Assignments
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 1 Individual Protecting Data
  • CYB 110 Week 1 Individual Security Policies
  • CYB 110 Week 1 Individual Risk Management
    Framework and CIA
  • CYB 110 Week 2 Individual Securing an Operating
    System

3
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 All Discussion (New Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 110 Week 1 Discussion Data breach (New
    Syllabus)
  •  
  • CYB 110 Week 2 Discussion Antivirus Software (New
    Syllabus)
  •  
  • CYB 110 Week 3 Discussion Online Email
    Attachments (New Syllabus)
  •  
  • CYB 110 Week 4 Discussion Security Measures (New
    Syllabus)
  •  
  • CYB 110 Week 5 Discussion CSCU Exam (New
    Syllabus)
  •  
  • CYB 110 Week 1 Discussion Secure Environment
  •  
  • CYB 110 Week 2 Discussion Malware

4
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Apply Week 1 Threats to Confidentiality,
    Integrity, and Availability (New Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Threats to Confidentiality, Integrity, and
    Availability
  •  
  • Assignment Content
  • There are many different threats to the
    confidentiality, integrity and availability of
    data-at-rest, data-in-transit, and processing
    Some threats affect one of these security risks
    like confidentiality only, and some threats
    affect more than one or even all these risks.

5
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Apply Week 2 Malware Attacks (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Wk 2 Apply Malware Attacks
  •  
  • Assignment Content
  • Playbooks, sometimes known as Standing Operating
    Procedures (SOP) or runbooks, are used for
    troubleshooting common issues. They are often
    created by a team of employees who are trained to
    manage security issues. Playbooks often include
    bulleted lists, step-by-step instructions, and/or
    diagrams all of which make it easy to follow
    troubleshooting instructions.
  • Throughout the next four weeks. you will develop
    a series of playbooks for a fictional company
    that hired you to write their playbooks and
    manage the team. The first portion of the
    playbook is a response to malware at the company.
  • Outline a 2-to 3-page playbook in which a malware
    attack of your choice occurs.
  • Include the following information
  • Title Page Introduction paragraph(s)
  • Details of the malware paragraph(s). The
    exploited vulnerability and its attack vector
    paragraph(s)
  • Two risks of this malware paragraph(s)
    Step-by-step instructions on how to resolve the
    malware attack. Provide a prescriptive series of
    steps/checklist items with instructions you would
    u

6
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Apply Week 3 Online Interactions (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 110 Apply Week 3 Online Interactions
  •  
  • Assignment Content
  • Online interactions pose a threat to all servers.
    There are risks that occur when employees use
    social networking web browsing and email.
    Playbooks typically cover a section related to
    threats and defenses of online interactions.

7
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Apply Week 4 Mobile Security (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Mobile devices are always in the workplace and
    being used for both personal and company
    business. You have been asked to create an
    informative poster to display throughout the
    office that highlights ways to secure mobile
    devices and safety precautions.

8
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Apply Week 5 Backup Policies (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Securing company data is not as simple as backing
    up to another hard drive. It is important to have
    backup tools, processes, and policies for both
    business continuity and disaster recovery plans.
  • In the final section of your playbook, create a
    3- to 4-page outline of backup policies for when
    the data center is inaccessible.

9
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Entire Course (New Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 110 Week 1 Discussion Data breach (New
    Syllabus)
  •  
  • CYB 110 Apply Week 1 Threats to Confidentiality,
    Integrity, and Availability (New Syllabus)
  •  
  • CYB 110 Week 1 Practice Practicelabs Microsoft
    Security Fundamentals (New Syllabus)
  •  
  •  
  • CYB 110 Week 2 Discussion Antivirus Software (New
    Syllabus)
  •  
  • CYB 110 Apply Week 2 Malware Attacks (New
    Syllabus)
  • CYB 110 Week 3 Discussion Online Email
    Attachments (New Syllabus)

10
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 1 Discussion Data breach (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words.
  •  
  • In case of a suspected data breach, what course
    of action should a chief information security
    officer (CISO) take?
  • How does the type of data breach affect the
    actions?
  • Select one type of data breach and the course of
    action that should be taken.

11
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 1 Discussion Secure Environment
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Research Playbook/Runbooks and the role they play
    in security.  
  • Discuss how a Playbook/Runbook relates to
    creating a secure environment and why policies
    are important for enforcing security.

12
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 1 Individual Protecting Data
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 1 Individual Protecting Data
  • There are many different threats to the
    confidentiality, integrity, and availability of
    data-at-rest. Some threats affect one of these
    security risks (like confidentiality only), and
    some threats affect more than one or even all of
    these risks.

13
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 1 Individual Risk Management
    Framework and CIA
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Risk Management Framework and CIA
  • In Ch. 1, "Introduction to Information Security,"
    of Elementary Information Security, you read
    about National Institute of Standards and
    Technology (NIST) Risk Management Framework (RMF)
    and how it expands on the CIA concepts.

14
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 1 Individual Security Policies
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 1 Individual Security Policies
  • You have been hired as a security specialist by a
    company to provide methods and recommendations to
    create a more secure environment for company
    data.
  • Write a 1- to 2-page recommendation paper
    outlining methods the company should consider to
    protect access to data, including recommendations
    for policies to be enacted that will increase
    data security.
  • Submit your assignment using the Assignment Files
    tab.

15
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 1 Practice Practicelabs Microsoft
    Security Fundamentals (New Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Microsoft Security Fundamentals
  •  
  • cyb 110 week 1 practice practicelabs microsoft
    security fundamentals (new syllabus)
  •  

16
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 2 Discussion Antivirus Software (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words.
  •  
  • Emma won a laptop at her high school science
    fair. The laptop does not have antivirus software
    installed on it so Emma must purchase one. Shell
    be using the laptop for college applications,
    schoolwork, and hopefully next year as a college
    freshman.
  •  
  • Respond to the following in a minimum of 175
    words
  • What top two factors should Emma keep in mind
    before purchasing the software?
  • Why are these the top factors to consider?
  • Where should she make the purchase?

17
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 2 Discussion Malware
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Research different types of malware, looking at
    specific examples and how they affected an
    organization. List examples of malware that pose
    threats to individuals or companies and their
    attack vectors.  
  • Discuss how companies or individuals can protect
    themselves from these malware examples

18
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 2 Individual Configuring Anti-Virus
    Software
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 2 Individual Configuring Anti-Virus
    Software
  • You are a security analyst at a large Security
    Operations Center (SOC). Malware infections have
    noticeably increased, and all the impacted
    machines did not have updated anti-virus
    signatures. Your task is to set the anti-virus
    software to secure your companys computers.
  • Note Module 3 of Certified Secure Computer User
    details two options for anti-virus protection,
    Kaspersky and Avast anti-virus software.
  • Choose one of the following two options

19
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 2 Individual Run/Playbook Part 1
    Malware
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Run/Playbook Part 1 Malware
  • Create the first section of your
    Playbook/Runbook.
  • This week you researched malware, attack vectors,
    and how they are related to cybersecurity.
  • Write a 1- to 2-page scenario in which a malware
    attack occurs. Include the following

20
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 2 Individual Securing an Operating
    System
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 2 Individual Securing an Operating
    System
  • You are a security administrator responsible for
    providing secure configuration requirements for
    new laptop deployments. After reading Module 2 of
    Certified Secure Computer User v2exercises, apply
    the configuration settings below on your Windows
    or Mac computer and take screenshots of each
    step

21
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 3 Discussion Online Email
    Attachments (New Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words.
  •  
  • Richard received an email from a person claiming
    to be his childhood friend, Kate. The email
    address is unknown to Richard, but the subject
    says that it is Kates new email address. It also
    has an attachment, which according to the
    subject, is a childhood picture of them.

22
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 3 Discussion Online Interaction
    Risks
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Retail stores often directly interact with
    customers online. Staff can also indirectly
    interact with the public online through their
    private social media. Discuss risks online
    interactions pose to a company. How can companies
    ensure appropriate interaction is taking place
    and balance that with security?

23
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 3 Individual Playbook/Runbook Part 2
    Social Network Security
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Playbook/Runbook Part 2 Social Network
    Security
  • Add a 1- to 2-page section to your
    Playbook/Runbook that includes the following
  • List of information and data employees
    are not to place online
  • Guidelines for interacting online

24
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 3 Individual Social Network Security
    Configuring a Social Network
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 3 Individual Social Network
    Security Configuring a Social Network
  • Your company encourages its employees to interact
    with the corporate Facebook page as a way to
    promote brand awareness and customer engagement.
    Your company wants employees to verify that their
    social media accounts are secure before engaging
    with a public corporate Facebook page that has
    thousands of users. Your task is to create a
    reference document demonstrating appropriate
    secure settings for Facebook.

25
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 4 Discussion Bring Your Own Device
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Your company is thinking of introducing a Bring
    Your Own Device (BYOD) policy. You have been
    tasked with assessing the risks associated with
    this implementation, including how to manage
    malware, data leakage, and access control.
  • Research threats and vulnerabilities by mobile
    and other devices introduced to networks through
    BYOD policies.
  • Discuss the following

26
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 4 Discussion Security Measures (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • shereen works as an executive reporter for news
    todays. the assignment in which she is currently
    working on will expose a major cover up at the
    mayors office. all the information shereen has
    gathered is stored on her phone, She is worried
    that someone may attempt to steal the phone in
    order to stop the story
  •  
  • Respond to the following in a minimum of 175
    words.
  • What are two security measures shereen can take
    to secure her mobile device?
  • Describe how to setup these security measures

27
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 4 Individual Configuring Security on
    Mobile Devices
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 4 Individual Configuring Security
    on Mobile Devices
  • Management approved a pilot program in which a
    controlled group of users can access certain
    company data from personally-owned mobile devices
    instead of purchasing corporate mobile devices
    for employees and contractors. As the Security
    Architect, you must provide

28
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 4 Individual Runbook/Playbook Part 3
    Network, Mobile Device, and Cloud Services
    Guidelines
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 4 Individual Runbook/Playbook Part 3
    Network, Mobile Device, and Cloud Services
    Guidelines
  • Individual Runbook/Playbook Part 3 Network,
    Mobile Device, and Cloud Services Guidelines
  • Add a 1- to 2-page section to your
    Playbook/Runbook.

29
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 5 Discussion CSCU Exam (New
    Syllabus)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • The Certified Secure Computer User (CSCU) exam is
    designed for those who use the internet for work,
    study, or play.
  • Respond to the following in a minimum of 175
    words
  •  
  •   How could this industry certification benefit
    you and your personal career goals?
  • What are two other resources you can use to
    prepare for this exam besides the materials
    provided in this course?

30
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 5 Discussion Data Backup Procedures
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • The university you work for has several different
    functional areas that maintain student
    information and data (e.g., registrar,
    accounting, financial aid, academic departments,
    etc.). 
  • Discuss what role backup policies and procedures
    play in protecting an organization with many
    different departments and their data. Why is it
    important to back up data? What are some examples
    of secure policies and procedures that could be
    used in this scenario to protect student
    information?

31
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 5 Individual Configure Backup
    Settings
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Configure Backup Settings
  • You want to ensure your personal computer is set
    to save data on a daily basis. Using OneDrive
    configure a personal computer to save and
    maintain data.
  • Configure backup settings as described below,
    taking screenshots to demonstrate your knowledge
  • Schedule a daily backup to an external
    physical storage device.
  • Schedule a weekly backup to Microsoft
    OneDrive.

32
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 5 Individual Disaster Recovery and
    Business Continuity Plan
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Disaster Recovery and Business
    Continuity Plan
  • You work for a multi-state company with three
    sites in three different
  • states, 1,000 employees, an ERP application with
    a backend database,
  • and two datacenters.

33
CYB 110 Become Exceptional / newtonhelp.com
  • CYB 110 Week 5 Individual Playbook/Runbook Part 4
    Secure Data Backup Guidelines
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Playbook/Runbook Part 4 Secure Data
    Backup Guidelines
  • NOTE Only Part 4 is Included - Part 1, 2, 3
    Not Included.
  • Add a 1- to 2-page section to your
    Playbook/Runbook.
  • Outline guideline policies and procedures to back
    up and secure your company's data.

34
CYB 110 Become Exceptional / newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com