CMGT 433 All Discussions

0 items
CMGT 433 All Discussions
CMGT 433 All Discussions
$12.00
  • Description

CMGT 433 Wk 1 Discussion – Cybersecurity vs. Traditional Enterprise Security

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

You would be hard-pressed to find a business or organization that does not have a website or use mobile or cloud-based solutions to advertise, sell products, or offer its services. It is because the business landscape is so entrenched on the Internet that makes it so critical for security managers and analysts to stay attuned and equipped to an organization’s cybersecurity needs.

Offer 2 ways that cybersecurity requirements differ from traditional enterprise security requirements. How do these requirements influence the methods used to protect data? Illustrate your response using realistic examples.

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

 

CMGT 433 Wk 2 Discussion – Vulnerability Management Life Cycle

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

Vulnerability scans as part of vulnerability management efforts are important events to conduct for any network infrastructure. Scans will often produce results that need to be analyzed for validity, followed by the development of a remediation plan to prioritize detected vulnerabilities, and determine actions to correct them. These ongoing efforts comprise the phases of the vulnerability management life cycle—testing, detection, and remediation.

  • Which factors are considered when prioritizing vulnerabilities for remediation? What data or metrics are used to evaluate these factors?
  • Describe a common type of cybersecurity vulnerability. Which tools are available to scan for this type of vulnerability? How do they work?
  • Explain techniques that might be used to validate a scan report. Differentiate and describe the 4 different types of scan reports.

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CMGT 433 Wk 3 Discussion – Identity and Access Exploits

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

Malicious hackers know that users are prone to be points of vulnerability on a given network. They take advantage of human errors by carrying out social engineering attacks or other forms of identity threats that aim to infiltrate a system via any weak point that can be found. Identity and access management systems are designed to enable organizations to manage user levels, privileges, and access security.

  • Describe 2 common ways secured accounts can be targeted in identity and authorization exploits.
  • What techniques would you use as preventive measures against either of these types of exploits?

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CMGT 433 Wk 4 Discussion – Indicators of Compromise

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

An important part of managing security in connections and communications between a secured network and the Internet at-large is to have a benchmark for what normal traffic looks like. Many applications exist for the purpose of monitoring, probing, or scanning traffic-related events to catch irregularities that can inform a deeper investigation.

  • What types of irregularities could signal a potential security event or incident? Describe at least 2 types of indicators.
  • Which tools would you recommend to track these indicators, and how would you respond to these occurrences on your network? How would you determine if these indicators signaled a real threat?

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CMGT 433 Wk 5 Discussion – Policy and Regulations

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

Security requirements are often closely tied to regulations that governments impose on organizations that hold any type of private, personal, or sensitive data. An effective security policy must address and enforce regulatory requirements for a given industry and jurisdictions where an organization operates. Having a good handle on what regulations apply where can become quite complex for a business headquartered and doing business in its home country while providing services internationally via its websites. While your situation may vary regarding the reach and complexity of your organizational experience, you will encounter the need to parse out legal language into functional requirements.

  • Identify an existing company or organization you’re familiar with or that you have researched. What products or services does it provide? What types of secure information would this entity hold? Where does it conduct its business or services? What regulations hold its actors accountable to the sensitive data in its keep?
  • What types of security policies and controls would you recommend to comply with the regulations and to uphold information security for this organization?

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.