UOP CYB110 All Assignments Latest

Question # 00773027 Posted By: rey_writer Updated on: 08/07/2020 11:17 AM Due on: 08/07/2020
Subject Education Topic General Education Tutorials:
Question
Dot Image

CYB110 Foundations of Security

Week 1 Assignment  

Threats to Confidentiality, Integrity, and Availability

Assignment Content

There are many different threats to the confidentiality, integrity and availability of data-at-rest, data-in-transit, and processing Some threats affect one of these security risks like confidentiality only, and some threats affect more than one or even all these risks.

Create a 1 -to 2-page table in Microsoft Word, listing a minimum of 6 threats using the column headers and details below:

- Title Page

Introduction paragraph(s) - Threat - List the threat.

- Threat to Type of Data (data-at-rest.data-in-transit or processing)

 - Identify the type,

- Confidentiality/Integrity/Availability

-Identify whether some or all are affected by labelling: C. Land/or.

- Mitigation Suggestion

- Describe a mitigation plan in 2-3 sentences. .

Conclusions . References

Cite at least two resources within the assignment in APA format.

Submit your assignment. You must use an assignment template if one is provides under the course resources.

 

CYB110 Foundations of Security

Week 2 Assignment  

Apply Malware Attacks 

Assignment Content

Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams: all of which make it easy to follow troubleshooting instructions.

Throughout the next four weeks. you will develop a series of playbooks for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.

Outline a 2-to 3-page playbook in which a malware attack of your choice occurs.

Include the following information:

Title Page Introduction paragraph(s)

Details of the malware paragraph(s). The exploited vulnerability and its attack vector paragraph(s)

Two risks of this malware paragraph(s) Step-by-step instructions on how to resolve the malware attack. Provide a prescriptive series of steps/checklist items with instructions you would utilize to deal with and mitigate the attack. Conclusions paragraph(s) References list

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines

Cite at least two resources within the assignment in APA format

Submit your assignment. You must use an assignment template if one is provides under the course resources

 

CYB110 Foundations of Security

Week 3 Assignment  

Online Interactions

Assignment Content

Online interactions pose a threat to all servers. There are risks that occur when employees use social networking web browsing and email. Playbooks typically cover a section related to threats and defenses of online interactions.

In this next section of your series of playbooks, outline steps to take when an employee reports clicking on a website that appeared in an email that was received

Include the following information in this section

Title Page

Introduction paragraph(s)

Descriptions of two threats this interaction poses on the company

Step-by-step instructions on how to mitigate each interaction. Provide a prescriptive series of steps/checklist items with instructions you would utilize to deal with and mitigate the attack. . Conclusions paragraph(s)

References list

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines

Cite at least two resources within the assignment in APA format.

Submit your assignment. You must use an assignment template if one is provides under the course resources.

 

CYB110 Foundations of Security

Week 4 Assignment  

Mobile Security

Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.

Create a visual poster or infographic to display in the company’s break room.

Include the following information:

At least two mobile device threats

List of ideal mobile security settings to defend against threats

Brief instructions for setting up at least two security settings

An explanation on what happens mobile devices are not secured from these threats

Appropriate images and graphics

Two resources for more information on mobile security, with appropriate citations

 

CYB110 Foundations of Security

Week 5 Assignment  

Backup Policies

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.

In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.

Include the following in your outline:

A list of tools used for backup purposes

An explanation of the following:

Where employees should work from that day

How employees can get to their data

The communication methods about updates

A step-by-step guide to recover your databases and telecommunications

A step-by-step guide to recover and provide any additional company assets

A description of policies for backup media storage

A description of policies for encryption of backup data

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

Cite at least two resources within the assignment in APA format.

 

Dot Image
Tutorials for this Question
  1. Tutorial # 00772580 Posted By: rey_writer Posted on: 08/07/2020 11:17 AM
    Puchased By: 2
    Tutorial Preview
    The solution of UOP CYB110 All Assignments Latest...
    Attachments
    Solution-00772580.zip (97 KB)

Great! We have found the solution of this question!

Whatsapp Lisa