CMGT 431 All Discussions

0 items
CMGT 431 All Discussions
CMGT 431 All Discussions
$12.00
  • Description

CMGT 431 Wk 1 Discussion – Secure Architecture

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. If postings only occur on 1 day instead of the required 2, the overall grade of the postings will be reduced by 10 points or 50% of the grade, whichever is less.

DQ Response Due Thursday(20 points) (2 Point late penalty applies for late submission.)

Respond to the following in a minimum of 175 words (Points may be deducted for short responses):

  • Security models and architectures are designed to fortify networks to discourage or deter attackers from targeting them, but no network is completely without vulnerabilities.
  • Name and explain 3 common flaws that can be found with secure architectures. What are some ways to mitigate these potential weaknesses?

Replies Due Monday (10 points each) (Not accepted late – postings after the week ends do not count toward the score.)

Due Day 7 

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

 

CMGT 431 Wk 2 Discussion – Secure Network Architecture

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. If postings only occur on 1 day instead of the required 2, the overall grade of the postings will be reduced by 10 points or 50% of the grade, whichever is less.

DQ Response Due Thursday(20 points) (2 Point late penalty applies for late submission.)

Respond to the following in a minimum of 175 words (Points may be deducted for short responses):

An organization’s success begins with building a strong, secure infrastructure, which includes the appropriate policies, procedures, and processes, as well as architecting a scalable, available, and secure network.

  • Describe the critical components of a cybersecurity architecture. Be sure it provides defense to protect the organization’s data, network, and assets.
  • Explain the function of each component and how each protects the organization.

Replies Due Monday (10 points each) (Not accepted late – postings after the week ends do not count toward the score.)

Reply to at least 2 posting. Be constructive and professional in your responses. Postings must be substantive.

Note: The Instructor will be posting messages relevant to the week’s objectives, but not necessarily related to the DQ, throughout the week in this thread. Questions may be included in these posts. Responding to these posts or answering the questions count toward your “Reply” requirement of two for the week.

Note: With very few and very specific exceptions, Discussion posts after the week ends will not count and will not be graded.

Copyright 2019 by University of Phoenix. All rights reserved.Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3 

Respond to the following in a minimum of 175 words:

An organization’s success begins with building a strong, secure infrastructure, which includes the appropriate policies, procedures, and processes, as well as architecting a scalable, available, and secure network.

  • Describe the critical components of a cybersecurity architecture. Be sure it provides defense to protect the organization’s data, network, and assets.
  • Explain the function of each component and how each protects the organization.

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CMGT 431 Wk 3 Discussion – Authentication Methodologies

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. If postings only occur on 1 day instead of the required 2, the overall grade of the postings will be reduced by 10 points or 50% of the grade, whichever is less.

DQ Response Due Thursday(20 points) (2 Point late penalty applies for late submission.)

Respond to the following in a minimum of 175 words (Points may be deducted for short responses):

Authentication ensures only authorized users are allowed into an organization’s network. As threats become more sophisticated, it is critical to have strong authentication in place from the policy, process, and technology perspective.

  • Describe the various mechanisms for implementing authentication to access a network. Why is single-factor authentication not enough protection in today’s network environment?
  • Discuss how integration of Identity-as-a-Service (IDaaS) can improve authentication capabilities in your chosen organization.

Replies Due Monday (10 points each) (Not accepted late – postings after the week ends do not count toward the score.)

Reply to at least 2 posting. Be constructive and professional in your responses. Postings must be substantive.

 

CMGT 431 Wk 4 Discussion – Assessing and Managing System Security

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. If postings only occur on 1 day instead of the required 2, the overall grade of the postings will be reduced by 10 points or 50% of the grade, whichever is less.

DQ Response Due Thursday(20 points) (2 Point late penalty applies for late submission.)

Respond to the following in a minimum of 175 words (Points may be deducted for short responses):

In order to secure information systems from attacks and other vulnerabilities, an IS professional must first perform security assessments to determine what threats and vulnerabilities can potentially weaken or bring down a network.

  • Choose a company and describe its services and the infrastructure it uses to provide these services.
  • Describe types of vulnerabilities the company can be susceptible to based on its users and infrastructure, and who would be affected.
  • Explain the types of security assessments you would employ and the steps you would recommend to manage the risks you identified.

Replies Due Monday (10 points each) (Not accepted late – postings after the week ends do not count toward the score.)

Reply to at least 2 posting. Be constructive and professional in your responses. Postings must be substantive.

 

CMGT 431 Wk 5 Discussion – Incident Response Plan

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. If postings only occur on 1 day instead of the required 2, the overall grade of the postings will be reduced by 10 points or 50% of the grade, whichever is less.

DQ Response Due Thursday(20 points) (2 Point late penalty applies for late submission.)

Respond to the following in a minimum of 175 words (Points may be deducted for short responses):

An incident response plan (IRP) is a set of procedures to help an organization detect, respond to, and recover from security incidents.

  • List the roles and responsibilities that are included in an IRP.
  • Discuss how the organization you analyzed in the Week 4 Discussion can respond to at least 1 cyberattack. The organization should have a response in accordance with the IRP.

Replies Due Monday (10 points each) (Not accepted late – postings after the week ends do not count toward the score.)

Reply to at least 2 posting. Be constructive and professional in your responses. Postings must be substantive.