CYB 205 All Discussions

0 items
CYB 205 All Discussions
CYB 205 All Discussions
$15.00
  • Description

CYB 205 All Discussions

The Latest Version A+ Study Guide

 

**********************************************

CYB 205 All Discussions Link

https://hwsell.com/category/cyb-205-all-discussions/

**********************************************

CYB 205 week 1 Discussion Question: Asset Management

 

 

Asset management is an important part of information security. Without knowing what assets you have, you cannot begin to secure them. But what is an asset?

Discuss the various types of assets a company might have, how they might be inventoried, and the potential threats to the various assets.

 

 

CYB 205 week 1 Discussion Question: Vulnerabilities

 

Vulnerabilities can exist in both a business’ software and hardware.

Discuss the differences between software and hardware vulnerabilities. How might these vulnerabilities impact a business?

 

 

CYB 205 week 2 Discussion Question: Threats to Data and Systems

Threats to data cannot be fully evaluated without knowing where information resides. A decade ago, all information was stored on servers in secure data centers accessible only on a company’s network. Today, datacenters could be on the premises or in the cloud and the data might be accessible from anywhere.

Research threats to modern information systems.

Share two different threats specific to data or to the systems hosting it. Discuss the threats in your classmates’ posts.

 

 

CYB 205 week 2 Discussion Question: Examples of Threats

Today’s datacenters are populated with not only physical hardware but systems hosting virtual machines and containers. These systems communicate locally and around the globe over networks.

Discuss two different examples of threats to various parts of heterogeneous architectures and how they might manifest. Do not forget about the hardware, operating systems, applications, networks, and other integral parts. Discuss the threats in your classmates’ posts.

 

 

CYB 205 week 3 Discussion Question: Cryptography

Cryptography has been around for millennia. Modern digital crypto systems are more robust than ever before.

Explain cryptography. Discusshow a modern encryption system is used to protect data and data use.

 

CYB 205 week 3 Discussion Question: Malware

Malware is an all-encompassing term for code which might perform malicious or unwanted functions on your system. It could include viruses, Trojans, worms, ransomware, rootkits, bots, and even adware.

Discuss potential defenses against malware. What is your experience with malware?

 

CYB 205 week 4 Discussion Question: Policies

Policies are a critical backbone to any information security program.

Research and discuss some of the elements necessary in modern information security policies for both on-premise systems and cloud-based services.

Respond to the policies presented by your classmates.

 

CYB 205 week 4 Discussion Question: Controls

Controls are countermeasures used to treat risks. Within the categories of administrative or technical controls, there can be preventative, detective, and responsive types of controls.

Research a specific control, and discuss how it differs from the other technical controls.

Example: An appropriate use policy could be an administrative preventative control.

 

CYB 205 week 5 Discussion Question: Cloud BC/DRP

 

Cloud-based systems and services are often ideal options for critical parts of a Business Continuity (BC) or Disaster Recovery Plan (DRP).

Research some of the ways this is being done today.

Discuss how cloud-based systems support business continuity.  How can potential risks be transferred to cloud providers?

Note: This information can be applied to the Week Five Individual Assignment, “Business Continuity and the Cloud.”

 

CYB 205 week 5 Discussion Question: Cloud-Based Risks

While the cloud-based systems and services are often ideal options for business continuity, these systems also come with risks.

Research some of the risks associated with a particular use of cloud services.

Discuss the differences between the IT risks faced by cloud-based services and a local datacenter.

Note: This information can be applied to the Week Five Individual Assignment, “Business Continuity and the Cloud.”