CMGT 433 All Discussions

0 items
CMGT 433 All Discussions
CMGT 433 All Discussions
$12.00
  • Description

CMGT 433 All Discussions

The Latest Version A+ Study Guide

 

**********************************************

CMGT 433 All Discussions Link

https://hwsell.com/category/cmgt-433/

**********************************************

 

CMGT 433 Wk 1 Discussion – Security of Mobile and Cloud Computing

Post a minimum total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. For more information on what is considered a substantive response, please review the announcement on this topic.

Due Thursday

Overall, there is a trend in organizations to use the Internet and WAN networks both public and private to deliver applications tp their end users, employees and customers. This is especially related to using more mobile and cloud computing in their IT portfolios. This trend requires security managers and/or analysts to realize that there are additional security requirements regarding the cyber environment.

Respond to the following in a minimum of 175 words:

  • Provide one way that cybersecurity requirements differ from more traditional enterprise security requirements.
  • How does this requirement affect the way an organization protects its data?
  • Provide a real-life example of a cybersecurity failure.
  • What are the security impacts of Edge Computing?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

CMGT 433 Wk 2 Discussion – Threat Modeling

Post a minimum total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. For more information on what is considered a substantive response, please review the announcement on this topic.

Due Thursday

Many organizations use the the SDLC (software/system development life cycle) framework for their application development efforts. Security is often addressed only during the testing phase. However, that practice has many flaws, especially the failure to identify threats and/or vulnerabilities when testing is done so late in the lifecycle.

Respond to the following in a minimum of 175 words:

  • How can you best include threat modeling within a company’s SDLC?
  • What is the best points of the lifecycle to include threat management?
  • What types of threat management would you include?
  • Why would you include it at the phase you chose instead of during another phase?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

CMGT 433 Wk 3 Discussion – Network Security Strategy

Post a minimum total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. For more information on what is considered a substantive response, please review the announcement on this topic.

Due Thursday

You are the IT manager for a small software consulting firm that specializes in financial services, healthcare and government projects. You have ten full-time employees and 10 to 12 part-time contract software consultants. The full-time staff typically work in the office, but sometimes work remotely. The contract staff are all remote off-shore.

You have been asked by the company owner to review the firm’s network security policies and systems. The president is interested in you recommendations for improving the security particularly of clients’ sensitive data.

Currently, the company has a wireless LAN network at the office, with 2 servers used for internal business processes, 10 on-site wireless workstations/devices, and 2 printers. The company has a single Broadband connection to the Internet at the office. Remote users have access to the company LAN network through a router at the office.

Respond to the following in a minimum of 175 words:

  • Identify at least one network security strategy that would help this organization to better protect their data and systems.
  • What are some of the data vulnerabilities you might need to address?
  • Why did you choose these strategies over others?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

CMGT 433 Wk 4 Discussion – Security Audit Groups

Post a minimum total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. For more information on what is considered a substantive response, please review the announcement on this topic.

Due Thursday

The software company that you worked with last week is concerned that they might be at risk due to the nature of their clients. They ask you for your recommendations for conducting a security audit. Security audits can be a very important method for identifying any security vulnerabilities. Some experts encourage organizations to include internal and external parties in a security audit. This means it might include all end users, which would involve all staff and the customers or client base. There are risks for including both of those groups that are not associated with a standard IT Audit.

 

Respond to the following in a minimum of 175 words:

  • What is a security audit and what different types of audit are used?
  • Discuss any audits that are specific to the firm’s industry and why they might be needed.
  • Would you exclude any group from the security audit?
  • Provide at least two supporting arguments for excluding this group.

 

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.or Audit department.

 

CMGT 433 Wk 5 Discussion – Security Policies

Post a minimum total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. For more information on what is considered a substantive response, please review the announcement on this topic.

 

Due Thursday

Respond to the following in a minimum of 175 words:

The software firm you have been working with these past few weeks determined that one of their vulnerabilities was the lack of a clear and concise security policy. Without a policy there is often an inconsistency in security focus by employees and management, with an increased risk for opportunities for security incidents.

 

Search the internet for two companies’ policies. Analyze the policies to determine commonalities. What would be your top three concepts that should be included in an organizational security policy mission statement? Explain your reasoning for your listed three concepts. How would this apply to the software consulting company? What is the difference between an internal policy and an external facing policy? How can you tell?

 

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.