CYB 110 Success Begins/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 110 Success Begins/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA CYB 110 Week 2 Individual Securing an Operating System – PowerPoint PPT presentation

Number of Views:15
Slides: 35
Provided by: bellflower2353

less

Transcript and Presenter's Notes

Title: CYB 110 Success Begins/newtonhelp.com


1
CYB 110 Success Begins/newtonhelp.com
2
CYB 110 Success Begins/newtonhelp.com
CYB 110 All Assignments For more course
tutorials visit www.newtonhelp.com       CYB 110
Week 1 Individual Protecting Data
3
CYB 110 Success Begins/newtonhelp.com
CYB 110 All Discussion (New Syllabus) For more
course tutorials visit www.newtonhelp.com     CYB
110 Week 1 Discussion Data breach (New
Syllabus)   CYB 110 Week 2 Discussion Antivirus
Software (New Syllabus)  
4
CYB 110 Success Begins/newtonhelp.com
CYB 110 Apply Week 1 Threats to Confidentiality,
Integrity, and Availability (New Syllabus) For
more course tutorials visit www.newtonhelp.com    
Threats to Confidentiality, Integrity, and
Availability   Assignment Content There are many
different threats to the confidentiality,
integrity and availability of data-at-rest,
data-in-transit, and processing Some threats
affect one of these security risks like
confidentiality only, and some threats affect
more than one or even all these risk
5
CYB 110 Success Begins/newtonhelp.com
CYB 110 Apply Week 2 Malware Attacks (New
Syllabus) For more course tutorials
visit www.newtonhelp.com     Wk 2 Apply Malware
Attacks   Assignment Content Playbooks, sometimes
known as Standing Operating Procedures (SOP) or
runbooks, are used for troubleshooting common
issues. They are often created by a team of
employees who are trained to manage security
issues. Playbooks often include bulleted lists,
step-by-step instructions, and/or diagrams all
of which make it easy to follow
6
CYB 110 Success Begins/newtonhelp.com
  CYB 110 Apply Week 3 Online Interactions (New
Syllabus) For more course tutorials
visit www.newtonhelp.com     CYB 110 Apply Week 3
Online Interactions   Assignment Content Online
interactions pose a threat to all servers. There
are risks that occur when employees
7
CYB 110 Success Begins/newtonhelp.com
CYB 110 Apply Week 4 Mobile Security (New
Syllabus) For more course tutorials
visit www.newtonhelp.com     Mobile devices are
always in the workplace and being used for both
personal and company business. You have been
asked to create an informative poster to display
throughout the office that highlights ways to
secure mobile devices and safety precautions.
This poster will be seen by the entire company in
hopes of empowering employees to protect
themselves and the company from mobile breaches.
8
CYB 110 Success Begins/newtonhelp.com
CYB 110 Apply Week 5 Backup Policies (New
Syllabus) For more course tutorials
visit www.newtonhelp.com     Securing company
data is not as simple as backing up to another
hard drive. It is important to have backup tools,
processes, and policies for both business
continuity and disaster recovery plans. In the
final section of your playbook, create a 3- to
4-page outline of backup policies
9
CYB 110 Success Begins/newtonhelp.com
CYB 110 Entire Course (New Syllabus) For more
course tutorials visit www.newtonhelp.com     CYB
110 Week 1 Discussion Data breach (New
Syllabus)   CYB 110 Apply Week 1 Threats to
Confidentiality, Integrity, and Availability (New
Syllabus)   CYB 110 Week 1 Practice Practicelabs
Microsoft Security Fundamentals (New Syllabus)
10
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 1 Discussion Data breach (New
Syllabus) For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words.   In case of
a suspected data breach, what course of action
should a chief information security officer
(CISO) take? How does the type of data breach
affect the actions?
11
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 1 Discussion Secure Environment
For more course tutorials visit www.newtonhelp.co
m     Respond to the following in a minimum of
175 words    Research Playbook/Runbooks and the
role they play in security.   Discuss how a
Playbook/Runbook relates to creating a secure
environment and why policies are important for
enforcing security.    
12
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 1 Individual Protecting Data For
more course tutorials visit www.newtonhelp.com    
  CYB 110 Week 1 Individual Protecting
Data There are many different threats to the
confidentiality, integrity, and availability of
data-at-rest. Some threats affect one of these
security risks (like confidentiality only), and
some threats affect more than one or even all of
these risks. Create a 1-page table in Microsoft
Word or Excel listing a minimum of five threats
using the column headers Threat to Data-at-Rest,
13
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 1 Individual Risk Management
Framework and CIA For more course tutorials
visit www.newtonhelp.com       Individual Risk
Management Framework and CIA In Ch. 1,
"Introduction to Information Security," of
Elementary Information Security, you read about
National Institute of Standards and Technology
(NIST) Risk Management Framework (RMF) and how it
expands on the CIA concepts.
14
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 1 Individual Security Policies For
more course tutorials visit www.newtonhelp.com    
  CYB 110 Week 1 Individual Security
Policies You have been hired as a security
specialist by a company to provide methods and rec
15
CYB 110 Success Begins/newtonhelp.com
  CYB 110 Week 1 Practice Practicelabs Microsoft
Security Fundamentals (New Syllabus) For more
course tutorials visit www.newtonhelp.com     Micr
osoft Security Fundamentals   cyb 110 week 1
practice practicelabs microsoft security
fundamentals (new syllabus)  

16
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 2 Discussion Antivirus Software (New
Syllabus) For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words.   Emma won a
laptop at her high school science fair. The
laptop does not have antivirus software installed
on it so Emma must purchase one. Shell be using
the laptop for college applications, schoolwork,
and hopefully next year as a college freshman.
17
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 2 Discussion Malware For more
course tutorials visit www.newtonhelp.com     Resp
ond to the following in a minimum of 175
words    Research different types of malware,
looking at specific examples and how they
affected an organization. List examples of
malware that pose threats to individuals or
companies and their attack vectors.   Discuss how
companies or individuals can protect themselves
from these malware examples  
18
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 2 Individual Configuring Anti-Virus
Software For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 2
Individual Configuring Anti-Virus Software You
are a security analyst at a large Security
Operations Center (SOC). Malware infections have
noticeably increased, and all the impacted
machines did not have updated
19
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 2 Individual Run/Playbook Part 1
Malware For more course tutorials
visit www.newtonhelp.com       Individual
Run/Playbook Part 1 Malware Create the first
section of your Playbook/Runbook. This week you
researched malware, attack vectors, and how they
are related to cybersecurity. Write a 1- to
2-page scenario in which a malware attack occurs.
Include the following Detail the
particular malware, the exploited vulnerability,
and its attack vector in
20
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 2 Individual Securing an Operating
System For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 2
Individual Securing an Operating System You are a
security administrator responsible for providing
secure configuration requirements for new laptop
deployments. After reading Module 2 of Certified
Secure Computer User v2exercises, apply the
configuration settings below on your Windows or
Mac computer
21
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 3 Discussion Online Email
Attachments (New Syllabus) For more course
tutorials visit www.newtonhelp.com     Respond to
the following in a minimum of 175
words.   Richard received an email from a person
claiming to be his childhood friend, Kate. The
email address is unknown to Richard, but the
subject says that it is Kates new email
22
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 3 Discussion Online Interaction
Risks For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words    Retail
stores often directly interact with customers
online. Staff can also indirectly interact with
the public online through their private social
media. Discuss risks online interactions pose to
a company. How can companies ensure appropriate
interaction is taking place and balance that
with security?
23
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security For more course
tutorials visit www.newtonhelp.com       Individua
l Playbook/Runbook Part 2 Social Network
Security Add a 1- to 2-page section to your
Playbook/Runbook that includes the following
List of information and data employees are
not to place online Guidelines for
interacting online Guidelines for secure
use of email
24
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network For more course
tutorials visit www.newtonhelp.com       CYB 110
Week 3 Individual Social Network Security
Configuring a Social Network Your company
encourages its employees to interact with the
corporate Facebook page as a way to promote brand
awareness and customer engagement. Your company
25
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 4 Discussion Bring Your Own Device
For more course tutorials visit www.newtonhelp.co
m     Your company is thinking of introducing a
Bring Your Own Device (BYOD) policy. You have
been tasked with assessing the risks associated
with this implementation, including
26
CYB 110 Success Begins/newtonhelp.com
  CYB 110 Week 4 Discussion Security Measures
(New Syllabus) For more course tutorials
visit www.newtonhelp.com     shereen works as an
executive reporter for news todays. the
assignment in which she is currently working on
will expose a major cover up at the mayors
office. all the information shereen has gathered
is stored on her phone, She is worried that
someone may attempt to steal the phone in order
to stop the story  
27
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 4 Individual Configuring Security on
Mobile Devices For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 4
Individual Configuring Security on Mobile
Devices Management approved a pilot program in
which a controlled group of users can access
certain company data from personally-owned mobile
devices instead of purchasing corporate mobile
devices for employees and contractors. As the
Security Architect, you must provide Bring Your
Own Device (BYOD) security best practice
guidelines for
28
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines For more course tutorials
visit www.newtonhelp.com       CYB 110 Week 4
Individual Runbook/Playbook Part 3 Network,
Mobile Device, and Cloud Services
Guidelines Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines Add a 1- to 2-page section to your
Playbook/Runbook.
29
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 5 Discussion CSCU Exam (New
Syllabus) For more course tutorials
visit www.newtonhelp.com     The Certified Secure
Computer User (CSCU) exam is designed for those
who use the internet for work, study, or
play. Respond to the following in a minimum of
175 words     How could this industry
certification benefit you and your personal
career goals?
30
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 5 Discussion Data Backup Procedures
For more course tutorials visit www.newtonhelp.co
m     Respond to the following in a minimum of
175 words    The university you work for has
several different functional areas that maintain
student information and data (e.g., registrar,
accounting, financial aid, academic departments,
31
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 5 Individual Configure Backup
Settings For more course tutorials
visit www.newtonhelp.com       Individual
Configure Backup Settings You want to ensure your
personal computer is set to save data on a daily
basis. Using OneDrive configure a personal
computer to save and maintain data.
32
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 5 Individual Disaster Recovery and
Business Continuity Plan For more course
tutorials visit www.newtonhelp.com       Individua
l Disaster Recovery and Business Continuity
Plan You work for a multi-state company with
three sites in three different states, 1,000
employees, an ERP application with a backend
database, and two datacenters.
33
CYB 110 Success Begins/newtonhelp.com
CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines For more course
tutorials visit www.newtonhelp.com       Individua
l Playbook/Runbook Part 4 Secure Data Backup
Guidelines NOTE Only Part 4 is Included - Part
1, 2, 3 Not Included.
34
CYB 110 Success Begins/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com