CYB 100 Education on your terms/snaptutorial.com

Page 1

CYB 100 All Assignments

For more classes visit www.snaptutorial.com CYB 100 Week 1 Organizational Data Flow CYB 100 Week 1 Protocols Lab CYB 100 Week 2 Individual Cyber security Laws CYB 100 Week 3 Assignment Conflict CYB 100 Week 3 Individual Geopolitics In Key Nations CYB 100 Week 4 Individual Final Project Part 1 Paper And Storyboard CYB 100 Week 5 Cloud Storage-as-a-Service Resource Lab CYB 100 Week 5 Final part 2 Cloud Storage as a Service Provider CYB 100 Assignment Week 1 Defining the Cyber Domain CYB 100 Assignment Week 2 Legal, Ethical, and Privacy Issues in the Cyber Domain CYB 100 Assignment Week 3 Security Planning and Risk Management CYB 100 Assignment Week 4 Intrusion Detection


CYB 100 Assignment Week 5 Roles in the Cyber Domain ===============================================

CYB 100 Assignment Week 1 Defining the Cyber Domain

For more classes visit www.snaptutorial.com Individual: Defining the Cyber Domain Instructions: The Chief Information Officer (CIO) of the organization you chose in the Week 1 discussion, "Key Components of an Information System as Related to the Cyber Domain," is looking for more information on the cyber domain in hopes of determining the organization's cybersecurity needs. As a cyber-security consultant, you believe you can provide the CIO with the information he needs. Using Microsoft® Word, write a 1- to 2-page communication to the CIO of the organization. Provide an overview of the following in your letter: • A definition of the cyber domain and its key components or aspects. The cyber domain encompasses cybersecurity, a discipline that involves the following: • Securing computer information, communications systems,


networks, infrastructures, assets • Protecting them against damage, unauthorized use, modification, exploitation • The components of an information system, elaborating on the similarities to the cyber domain • An approach to implementing information security for the organization you chose and how that approach could be expanded to the larger cyber domain • The systems development life cycle compared to the cyber domain life cycle • The components of the threat environment for the organization you chose, including an argument that a threat to the organization is also a threat to the larger domain Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. Supporting Material: Assignment Grading Guide ===============================================

CYB 100 Assignment Week 2 Legal, Ethical, and Privacy Issues in the Cyber Domain

For more classes visit www.snaptutorial.com Individual: Legal, Ethical, and Privacy Issues in the Cyber Domain Instructions: The CIO of the organization you chose read your letter and would like to meet with you to discuss the legal, ethical, and privacy issues


governing the cyber domain and directly impacting the organization. Research the legal, ethical, and privacy issues as they relate to your chosen organization and the broader cyber domain. Using Microsoft® PowerPoint®, prepare a 12- to 14-slide, media-rich presentation for the CIO that includes the following: • Title slide • At least 2 fundamental U.S. laws that impact the organization and the cyber domain • At least 3 compliance laws and regulations governing the cyber domain and impacting the organization • At least 4 organizational security issues • At least 3 security technologies used to comply with laws and that support ethics in information security for the organization Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. ===============================================

CYB 100 Assignment Week 3 Security Planning and Risk Management

For more classes visit www.snaptutorial.com


Individual: Security Planning and Risk Management Instructions: Resource: Security Planning and Risk Management Template The CIO of the organization you chose is ready for you to take a look at the organization's potential vulnerabilities and threats. Complete the 1.5- to 2-page Security Planning and Risk Management Template. Include the following: • Considering the aspects or components of the cyber domain, list potential vulnerabilities or threats facing the organization. • Give a description of the risk each vulnerability or threat would have on the organization in terms of its people, network, data, or reputation. • Explain each risk's impact on the organization. • Provide a defined mitigation for each vulnerability, such as an incident response plan, disaster recovery plan, or business continuity plan. Or, give a defined reason why this vulnerability or threat would not be mitigated, such as the use of a different risk control strategy. Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. Supporting Material: Assignment Grading Guide ===============================================

CYB 100 Assignment Week 4 Intrusion Detection


For more classes visit www.snaptutorial.com Individual: Intrusion Detection Instructions: After reviewing your latest submission, the CIO has found some areas of concern and would like you to provide a little clarity on one subject. He is meeting with upper management to persuade them to purchase a new suite of intrusion detection software for the network. Currently, the organization has antivirus software and uses firewalls. Provide justification for adding intrusion detection software (IDS), as well. Research various IDS that would benefit the company. Create a 2-page table for the CIO to share with upper management. Include the following: • Reasons why IDS would benefit the company and the larger cyber Domain • Descriptions of the categories and models of intrusion detection and prevention systems • A description of the function of antivirus software, firewalls, and IDS • Examples of commercial software that could provide the solution Include citations as necessary in APA format. Click the Assignment Files tab to submit your assignment. Supporting Material: Assignment Grading Guide ===============================================


CYB 100 Assignment Week 5 Roles in the Cyber Domain

For more classes visit www.snaptutorial.com Individual: Roles in the Cyber Domain Instructions: The presentation was a success, and the CIO of the organization you choose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the intrusion detection software (IDS) solution. Therefore, you will provide him with the following information to consider in his planning: Part A: Create 1- to 1.5-page summary including the following: • The number of additional employees necessary to rollout and support an IDS desktop solution • An explanation as to how individuals work with the existing desktop support and malware teams • The job title for those who normally perform rollout and support functions for the IDS desktop solution • An outline of the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution

Part B: Create an infographic using an infographic maker, such as Piktochart,


Venngage, or Canva, displaying an organization chart showing the following: • The job titles provided in your summary and how they fit in with the existing cybersecurity team • A list of the industry certifications the new IDS rollout-and-support function employees should have or can work toward Include citations as necessary in APA format. Select the Assignment Files tab to submit your assignment. ===============================================


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.