CMGT 433 All Discussions

0 items
CMGT 433 All Discussions
CMGT 433 All Discussions
$12.00
  • Description

CMGT 433 All Discussions

The Latest Version A+ Study Guide

 

**********************************************

CMGT 433 All Discussions Link

https://hwsell.com/category/cmgt-433-all-discussions/

**********************************************

 

CMGT 433 Wk 1 Discussion – Security Requirements Related to Mobile and Cloud Computing

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Overall, there is a trend in organizations to incorporate the internet into many of their operations, especially related to mobile and cloud computing. This trend requires security managers and/or analysts to realize that there are additional security requirements regarding the cyber environment.

Provide one way that cybersecurity requirements differ from traditional enterprise security requirements. How does this requirement affect the way you protect data? Provide a real-life example of a cybersecurity failure.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

CMGT 433 Wk 2 Discussion – Threat Modeling

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

The SDLC (software/system development life cycle) framework, where security is often addressed only during the testing phase, is sometimes used by organizations. However, that practice has many flaws, especially the failure to identify threats and/or vulnerabilities because testing is done so late in the framework.

How can you include threat modeling within your SSDLC? At what points of the lifecycle would you include threats? Why would you do it then instead of another phase?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

CMGT 433 Wk 3 Discussion – Network Security Strategy

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the network consists of 2 servers for internal business processes, 1 server that handles the call-in connections; 10 on-site wireless workstations/devices, and 2 printers.

Identify one network security strategy that would help this organization. Why did you choose this strategy over others?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

CMGT 433 Wk 4 Discussion – Security Audit Groups

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

During a security audit, it has been promoted that it is important to include all end users, which would involve all staff and also your customer or client base. There are risks for both of those groups that are not included in the IT or Audit department. Who do you exclude from the security audit?

Provide at least two supporting arguments for excluding this group.

 Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

CMGT 433 Wk 5 Discussion – Security Policies

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Many organizations lack a clear and concise security policy. Without a policy there is often an inconsistency in security focus by employees and management and increased opportunities for experiencing security incidents.

Search the internet for two companies’ policies. Analyze the policies to determine commonalities. What would be your top three concepts that should be included in an organizational security policy mission statement? Explain your reasoning for your listed three concepts.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.