Page 1

CYB 100 All Assignments

For more classes visit www.snaptutorial.com CYB 100 Week 1 Organizational Data Flow CYB 100 Week 1 Protocols Lab CYB 100 Week 2 Individual Cyber security Laws CYB 100 Week 3 Assignment Conflict CYB 100 Week 3 Individual Geopolitics In Key Nations CYB 100 Week 4 Individual Final Project Part 1 Paper And Storyboard CYB 100 Week 5 Cloud Storage-as-a-Service Resource Lab CYB 100 Week 5 Final part 2 Cloud Storage as a Service Provider

CYB 100 Week 1 Organizational Data Flow

For more classes visit


www.snaptutorial.com You have recently been hired as a Cybersecurity Intern with a mediumsized company that is growing very rapidly. The Chief Information Officer (CIO) is trying to understand the importance of the Cyber Domain that the Chief Information Security Officer (CISO) keeps talking about when they discuss expanding the business. The CISO has asked you to write an email to the CIO that explains the scope of the Cyber Domain, common assets of the Cyber Domain, and important milestones in its development. Write a 350-to 700-word email using Microsoft® Word to the CIO explaining the following:  Clearly define the term "Cyber Domain"  Accurately describe the maritime, space, and physical domains  Accurately describe three milestones in the development of communication and information technology, and security  Correctly describe the impact cloud computing has had on the Cyber Domain  List at least four high value assets that are common to information and communication systems, networks, the cloud, and infrastructure Make sure rules of grammar and usage are followed, including spelling and punctuation.

CYB 100 Week 1 Protocols Lab

For more classes visit www.snaptutorial.com


Cyberspace and the Internet (the Web) are closely related. The term "Internet" refers to a series of protocols which represent actual methods of access and transfer of digital assets. Most internet users are familiar with the protocol of HTTP and the multimedia part of the Web called the World Wide Web (WWW). Other protocols are included in the TCP/IP protocol suite. IT and Web specialists are aware of these other protocols and their uses. Knowledge of these protocols is important to recognizing risks in cyberspace. This lab will employ one of these additional protocols and demonstrate the "reach" and scope of Cybersecurity and the Cyber Domain. An internet-connected browser enabled device is required for this lab. Complete the following: 1. Research HTTP, TCP/IP, and FTP protocols and accurately describe each. 2. Launch a browser and go to http://ftp.swfwmd.state.fl.us/pub/out/ 3. Sort on "Last Modified" o What is the date of the oldest file? 4. Sort on the "NAME" 5. What is the name of the first file? 6. What is the "TITLE" found on the opened 103919.PDF image when viewed locally with Acrobat Reader? 7. Is the map of Southwest Florida? 8. What function does the FTP protocol do? 9. What authorization was required to access the 103929.PDF file? 10. What controls the use of this file? 11. How many miles/kilometers is the Server from you? 12. Is there a risk involved related to the ease of access to such files? Write a 90- to 175-word Question and Answer paper using MicrosoftÂŽ Word that addresses each of the questions. Submit your assignment using the Assignment Files tab.


CYB 100 Week 2 Individual Cyber security Laws

For more classes visit www.snaptutorial.com The U.S. has in place many laws related to information security, computer security, and internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information. Write a 2-page paper using Microsoft® Word that answers the following questions:  For two laws from Table 3.1 in Principles of Information Security, state the overall intent of each law. For example what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do?  Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below: o Computer Fraud and Abuse Act o National Information Infrastructure Protection Act o Sarbanes-Oxley Act  Having reviewed these laws and cases/complaints associated with them, completely answer each of the following:  Which of these laws seemed more frequently enforced? Which of these laws have resulted in a large financial impact to a business? Which of these have imposed a strict punitive damage (e.g., someone being convicted of fraud)?


According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement?  Accurately explain if the ethical confidentiality of all private information is assured by the three laws  Based on your Learning Team discussion, list at least two conflicts faced by U.S. cloud service providers when providing services globally. Use APA citation formatting in all work submission. Follow rules of grammar and usage, including spelling and punctuation. 

CYB 100 Week 3 Assignment Conflict

For more classes visit www.snaptutorial.com Research a current domestic or international conflict in the cyber domain. As a way of checking for your understanding of the nature of conflict as described in the video,write a 1-page methodology for resolving the conflict using Microsoft® Word that addresses the following:  Identify the reason for the conflict and the opposing forces  Accurately identify the key political figures that impact the outcome or resolution of the conflict  If you were involved with the resolution of the conflict, what style of conflict resolution would you use--the competing shark, the collaborating owl, the avoiding turtle, the accommodating teddy bear, or the compromising fox--and why?


Do you think in our current political environment we may take the easy way out and try to sweep the conflict under the rug?  There is one simple widely used method to resolve common conflict that goes by the acronym DESC that stands for Describe, Express, Specify, Consequences. Do you think this method could be used to resolve the conflict you identified? Do you think methods for conflict resolution in the workplace are the same as geological conflicts? Why or why not? Submit your assignment using the Assignment Files tab. 

CYB 100 Week 3 Individual Geopolitics In Key Nations

For more classes visit www.snaptutorial.com Create a 1-page 4 row by 3 column table in Microsoft® Word that depicts laws for the U.S. and two other key nations in the strategic, tactical, and operational areas of cybersecurity. Provide a brief description of the law for each category of cybersecurity provided. The table column headings could be U.S., Russia, and China, for instance (or two other key nations of your choice). The row labels are Strategical, Tactical, and Operational. Create a Microsoft® PowerPoint® presentation containing 8 slides, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide.


Scenario: You are attending the company board meeting with your supervisor, the VP of Information Technology. The U.S.-based company is considering expanding into 100 countries worldwide. You will be presenting to the Board of Directors so they can understand the cyber threat each key nation poses to the company so they can make a more informed decision on how best to achieve international growth. Your task is to:  Accurately define "geopolitics"  Identify the geopolitics of key nations (include at a minimum: U.S., China, Russia, Israel, and Iran)  Accurately describe the differences of each key nation's political stance on cyber war  Describe past international cyber conflicts and the resulting impact to the economy of each nation involved  Accurately define "cyber-attack"  State the impact of cyber-attacks on U.S. companies All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

CYB 100 Week 4 Individual Final Project Part 1 Paper And Storyboard

For more classes visit www.snaptutorial.com Write a 350-word FAQ document using Microsoft® Word in response to the following:


Scenario One: You are preparing for a new company-wide project to implement cloud technology. In preparation for the project rollout, the VP of Information Technology has asked you to prepare a FAQ document describing cyberspace and its associated complexities for all staff so they understand cyberspace, and cloud technology. The U.S.based company has 100,000 staff members and offices in 100 countries. Your task is to, in the form of an FAQ, provide answers to the following:  What are the definition of cyberspace, and the maritime, space, and physical domains? Provide a concise description of cyberspace and the maritime, space, and physical domains  How do international laws affect citizens and companies in the U.S.? Accurately describe how international laws affect citizens and companies in the U.S.  How do political elements within the U.S. affect cyber security? Accurately describe how political elements within the U.S. can affect cyber security  Why is cyber security so complex in cloud technology? Concisely explain the complexities of cyber security in cloud technology  What advantages can cloud technology offer to businesses? Describe at least two advantages cloud technology can offer businesses Scenario Two: You have recently been hired as a Cybersecurity Intern with a medium size company that has been growing very rapidly. The company supports outreach to the community and has set up a forum to help high school students understand important concepts in security. Your boss has asked you to set up a storyboard that will be used to present to the students to highlight the differences between espionage, intelligence gathering, and cyber warfare. He also wants you to help them understand the physical assets of the Cyber Domain. If you are successful with the storyboard, your boss plans to turn this into an infomercial.


Develop a 8-slide/panel storyboard document using Microsoft® Word or PowerPoint®. Your storyboard should:  Accurately depict the differences between espionage, intelligence gathering, and cyber warfare at a level that high school students can relate to  Accurately describe the influence the military has had on intelligence gathering, cyber warfare, and physical assets  Provide a complete timeline of a recent incident involving personal privacy including the nature of the attack, and providing insight into the risks of conducting business in cyberspace  Enumerate at least five physical assets of the Cyber Domain, including an explanation of why you included the assets  Examine where we are today in the areas of espionage, intelligence gathering, cyber warfare, and physical assets, and offer a prediction of the future given your current perspective All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

CYB 100 Week 5 Cloud Storage-as-a-Service Resource Lab

For more classes visit www.snaptutorial.com Write a 1-page informal paper using Microsoft® Word that answers the following questions:


     

Accurately define Cloud Storage-as-a-Service Accurately describe how to get to OneDrive® from a web browser Describe in a set-by-step manner how to sync files What is a guest link? List three ways you can control access in OneDrive® Describe two vulnerabilities you think OneDrive® has

CYB 100 Week 5 Final part 2 Cloud Storage as a Service Provider

For more classes visit www.snaptutorial.com Create a Microsoft® PowerPoint® presentation containing eight slides, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide. Scenario: You are preparing for a new company-wide project to provide each employee with a personal cloud storage account. The VP of Information Technology has asked you to research solutions for the organization and make sure the CSaaS provider encrypts data in transit and at rest. The U.S.-based company has 100,000 staff members and offices in 100 countries. You will be preparing a presentation of products to present to the company's Information Technology Committee so they can understand the technology, security features, and associated cyber risk. Your task is to:  Research Cloud Storage-as-a-Service (CSaaS) providers


Briefly define the technology involved to implement a cloud-based technology such as CSaaS  Briefly describe the registration and authentication process for one of the providers  Correctly identify the encryption technology used both in transit and in storage for one provider  Correctly identify the ethics and privacy policies of one CSaaS provider All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used. 

CYB 100 Education on your terms/snaptutorial.com  

Which motivating factors are most effectively used by the employer you identified? What could the employer do to improve the use of motiva...

CYB 100 Education on your terms/snaptutorial.com  

Which motivating factors are most effectively used by the employer you identified? What could the employer do to improve the use of motiva...

Advertisement