UOP CYB110 All Assignments Latest

CYB110 Foundations of Security
Week 1 Assignment
Threats to Confidentiality, Integrity, and Availability
Assignment Content
There are many different threats to the confidentiality, integrity and availability of data-at-rest, data-in-transit, and processing Some threats affect one of these security risks like confidentiality only, and some threats affect more than one or even all these risks.
Create a 1 -to 2-page table in Microsoft Word, listing a minimum of 6 threats using the column headers and details below:
- Title Page
Introduction paragraph(s) - Threat - List the threat.
- Threat to Type of Data (data-at-rest.data-in-transit or processing)
- Identify the type,
- Confidentiality/Integrity/Availability
-Identify whether some or all are affected by labelling: C. Land/or.
- Mitigation Suggestion
- Describe a mitigation plan in 2-3 sentences. .
Conclusions . References
Cite at least two resources within the assignment in APA format.
Submit your assignment. You must use an assignment template if one is provides under the course resources.
CYB110 Foundations of Security
Week 2 Assignment
Apply Malware Attacks
Assignment Content
Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams: all of which make it easy to follow troubleshooting instructions.
Throughout the next four weeks. you will develop a series of playbooks for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.
Outline a 2-to 3-page playbook in which a malware attack of your choice occurs.
Include the following information:
Title Page Introduction paragraph(s)
Details of the malware paragraph(s). The exploited vulnerability and its attack vector paragraph(s)
Two risks of this malware paragraph(s) Step-by-step instructions on how to resolve the malware attack. Provide a prescriptive series of steps/checklist items with instructions you would utilize to deal with and mitigate the attack. Conclusions paragraph(s) References list
Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines
Cite at least two resources within the assignment in APA format
Submit your assignment. You must use an assignment template if one is provides under the course resources
CYB110 Foundations of Security
Week 3 Assignment
Online Interactions
Assignment Content
Online interactions pose a threat to all servers. There are risks that occur when employees use social networking web browsing and email. Playbooks typically cover a section related to threats and defenses of online interactions.
In this next section of your series of playbooks, outline steps to take when an employee reports clicking on a website that appeared in an email that was received
Include the following information in this section
Title Page
Introduction paragraph(s)
Descriptions of two threats this interaction poses on the company
Step-by-step instructions on how to mitigate each interaction. Provide a prescriptive series of steps/checklist items with instructions you would utilize to deal with and mitigate the attack. . Conclusions paragraph(s)
References list
Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines
Cite at least two resources within the assignment in APA format.
Submit your assignment. You must use an assignment template if one is provides under the course resources.
CYB110 Foundations of Security
Week 4 Assignment
Mobile Security
Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.
Create a visual poster or infographic to display in the company’s break room.
Include the following information:
At least two mobile device threats
List of ideal mobile security settings to defend against threats
Brief instructions for setting up at least two security settings
An explanation on what happens mobile devices are not secured from these threats
Appropriate images and graphics
Two resources for more information on mobile security, with appropriate citations
CYB110 Foundations of Security
Week 5 Assignment
Backup Policies
Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.
In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.
Include the following in your outline:
A list of tools used for backup purposes
An explanation of the following:
Where employees should work from that day
How employees can get to their data
The communication methods about updates
A step-by-step guide to recover your databases and telecommunications
A step-by-step guide to recover and provide any additional company assets
A description of policies for backup media storage
A description of policies for encryption of backup data
Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.
Cite at least two resources within the assignment in APA format.

-
Rating:
5/
Solution: UOP CYB110 All Assignments Latest