CMGT 400 All Discussions

0 items
CMGT 400 All Discussions
CMGT 400 All Discussions
$12.00
  • Description

CMGT 400 Wk 1 Discussion – Actual Threats

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Network security is a real concern for businesses. Research 1 recent threat posed to a network to use for this discussion.

Respond to the following in a minimum of 175 words:

  • What type of threat occurred?
  • How was it resolved?
  • What are 2 takeaways from this scenario that can be applied to your future career?

Due Day 7

Post 2 replies to classmates or your faculty member of 100-200 words each. Be constructive and professional.

 

CMGT 400 Wk 2 Discussion – Firewalls

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

 

Due Day 3

A firewall is a device that prevents unauthorized access to a host or a network either from within the corporate environment or from the public network, like the Internet. Generally, there are 2 types of firewalls:

  • A hardware firewall takes the form of a closed proprietary appliance with its own operating system. This is considered faster, but a bit expensive.
  • A software firewall is installed on a computer, and it utilizes the computer’s operating system. Firewalls use either hardware or software rules to filter incoming and outgoing traffic to the network.

Respond to the following in a minimum of 175 words:

  • How could you use firewalls to support organizational security?
  • What are the advantages and disadvantages of using hardware- and software-based firewalls?
  • What software tools could you use to assess the security of the firewalls used to protect your organization’s computer architecture?
  • How can you bypass blocked sites using anonymous website surfing sites?

Due Day 7

Post 2 replies of 100-200 words (each) to classmates or your faculty member. Be constructive and professional.

 

CMGT 400 Wk 3 Discussion – Computer Security Technology

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Jane Smith is responsible for security at the ABC Company. She has a moderate budget with which to purchase security solutions. To date, she has installed a router-based firewall between the network and the outside world. She also has a commercial virus scanner on every machine on the network.

Respond to the following in a minimum of 175 words:

  • What other actions might you recommend to her?
  • Would you recommend a different firewall? Why or why not?

 

Due Day 7

Post 2 replies of 100-200 words each to classmates or your faculty member. Be constructive and professional.

 

CMGT 400 Wk 4 Discussion – Cybersecurity Risk Response

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

A cybersecurity risk-management plan is a plan designed to protect a system exposed to the Internet, internal employees, contractors, disasters, failures, and more.

Respond to the following in a minimum of 175 words:

  • What are some common cybersecurity risk responses, change management, version control, and incident response processes that you might consider incorporating if you created a cybersecurity plan? Identify and discuss them.
  • Are cybersecurity risk-management processes similar from system to system?
  • Where can you locate best practices for preventing or mitigating cybersecurity risk-management threats?

Due Day 7

Post 2 replies of 100-200 words each to classmates or your faculty member. Be constructive and professional.

 

CMGT 400 Wk 5 Discussion – Embedded Systems

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Embedded systems are being integrated into many products. They are also being used to enable the Internet of Things (IoT). As embedded systems become more widespread, they present additional opportunities for hackers to exploit them to gain access to systems and data.

Respond to the following in a minimum of 175 words:

  • How should organizations analyze the security implications of embedded systems that they use?
  • What are the consequences of having unprotected Linux® operating systems installed on embedded systems?
  • What steps should an organization take to secure the embedded systems that integrate with their technology architecture?

Due Day 7

Post 2 replies of 100-200 words each to classmates or your faculty member. Be constructive and professional.