UOP CMGT433 All Weeks Discussions Latest

CMGT433 Cyber Security
Week 1 Discussion
Security Requirements Related to Mobile and Cloud Computing
Includes 5 Full Answers to Discussion Question
Overall, there is a trend in organizations to incorporate the internet into many of their operations, especially related to mobile and cloud computing. This trend requires security managers and/or analysts to realize that there are additional security requirements regarding the cyber environment.
Provide one way that cybersecurity requirements differ from traditional enterprise security requirements. How does this requirement affect the way you protect data? Provide a real-life example of a cybersecurity failure.
CMGT433 Cyber Security
Week 2 Discussion
Threat Modeling
Includes 5 Full Answers to Discussion Question
The SDLC (software/system development life cycle) framework, where security is often addressed only during the testing phase, is sometimes used by organizations. However, that practice has many flaws, especially the failure to identify threats and/or vulnerabilities because testing is done so late in the framework.
How can you include threat modeling within your SSDLC? At what points of the lifecycle would you include threats? Why would you do it then instead of another phase?
CMGT433 Cyber Security
Week 3 Discussion
Network Security Strategy
Includes 5 Full Answers to Discussion Question
DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the network consists of 2 servers for internal business processes, 1 server that handles the call-in connections; 10 on-site wireless workstations/devices, and 2 printers.
Identify one network security strategy that would help this organization. Why did you choose this strategy over others?
CMGT433 Cyber Security
Week 4 Discussion
Security Audit Groups
Includes 5 Full Answers to Discussion Question
During a security audit, it has been promoted that it is important to include all end users, which would involve all staff and also your customer or client base. There are risks for both of those groups that are not included in the IT or Audit department. Who do you exclude from the security audit?
Provide at least two supporting arguments for excluding this group.
CMGT433 Cyber Security
Week 5 Discussion
Security Policies
Includes 5 Full Answers to Discussion Question
Many organizations lack a clear and concise security policy. Without a policy there is often an inconsistency in security focus by employees and management and increased opportunities for experiencing security incidents.
Search the internet for two companies' policies. Analyze the policies to determine commonalities. What would be your top three concepts that should be included in an organizational security policy mission statement? Explain your reasoning for your listed three concepts.

-
Rating:
5/
Solution: UOP CMGT433 All Weeks Discussions Latest