Refer a friend and get % off! They'll get % off too.

CYB 100 All Discussions

CYB 100 All Discussions

The Latest Version 

 

CYB 100 Week 1 Discussion Question: Key Components of an Information System as Related to the Cyber Domain
 

Resource: Week One video, “Information Security Terminology”

Using the terminology presented in the “Information Security Terminology” video, information from the textbook and online sources, research the key components of an information system for an organization of your choosing.

Discuss the relationship between the key components of the information system you chose and how they relate to the cyber domain.

Note: You will use this information and continue to study the organization you chose in the Week 1 discussion, “Information Security Implementation,” and the Week 1 assignment, “Defining the Cyber Domain.”

 

 
 

 

 
 

 

 
 

 

 

CYB 100 Week 1 Discussion Question: Information Security Implementation
 

 

 

Different organizations have different approaches to implementing information security.

Research the approaches to information security implementation for the organization you chose in the discussion, “Key Components of an Information System as Related to the Cyber Domain,” and one additional organization.

Discuss the similarities and differences between each organization’s approach to information security implementation. Include any experience you have with either approach.

Note: You will use this information and continue to study the organization you chose in the Week 1 assignment, “Defining the Cyber Domain.”

 

 
 

 

 
 

 

 

 
 

 

 

 
 

 

 
 

CYB 100 Week 2 Discussion Question: Legal and Ethical Issues

 

 

Resource: Table 3-1, “Key U.S. Laws of Interest to Information Security Professionals,” in Ch. 3, “Legal, Ethical, and Professional Issues in Information Security,” of Principles of Information Security

Research fundamental U.S. laws, security laws, regulations, and guidelines that impact the cyber domain in The Security Laws, Regulations and Guidelines Directory on the CSO from IDG website.

Discuss the laws and regulations that most impact information security professionals. Include the following in your discussion:

 

 

 

The roles of those responsible for upholding the laws
 

 

The impact of laws and regulations on the organization you chose in Week 1
 

 

How ethics and politics across various domains (space, maritime, and physical) of states and global nations differ from those in the U.S.
 

 

Your experience with any of the laws and regulations
 

 

 

Note: You will use information from this discussion in your Week 2 assignment, “Legal, Ethical, and Privacy Issues in the Cyber Domain.”

 

 
 

 

 
 

 

CYB 100 Week 2 Discussion Question: Security Technology

 

Research the security and privacy issues the organization you chose in Week 1 faces. Whose job is it to address the security issues?

Discuss how security technology is used in response to issues within the organization, as well as in enforcing the law and handling issues of ethics in information security.

Consider how security technology secures computer information and communications systems, networks, infrastructures, and assets, and protects them against damage, unauthorized use, modification, or exploitation. Which roles within the organization deal with ethical compliance and enforcement of laws?

Note: You will use information from this discussion in your Week 2 assignment, “Legal, Ethical, and Privacy Issues in the Cyber Domain.”

 

 
 

 

 
 

 

 

 
 

 

 

 

CYB 100 Week 3 Discussion Question: Roles in Security Planning
 

 

Research important jobs or roles in security planning.

Discuss how security planning roles function in risk management. How do important roles in security planning relate to the cyber domain?

 

 
 

 

 
 

 

CYB 100 Week 3 Discussion Question: Security Planning

 

 

Resource: The following Week Three videos:

 

 

 

“Contingency Planning”
 

 

“Risk Assessment”
 

 

“Risk Control”
 

 

 

Research the potential vulnerabilities and threats faced by the organization you chose in Week 1.

Discuss the steps involved in security planning for the organization. How important is risk management in the security planning process for the organization? How do the existing vulnerabilities and threats impact the importance of risk management?

Note: You will use information from this discussion to complete the Week 3 assignment, “Security Planning and Risk Management.”

 

 
 

 

 
 

 

 

 
 

 

 

CYB 100 Week 4 Discussion Question: Physical Asset Controls
 

 

 

Physical asset controls vary depending on where they reside.

Research physical asset controls in the space, maritime (oceans, seas, bays, estuaries, islands, and coastal areas), and physical domains.

Discuss physical asset controls in space, maritime, and physical domains of states and nations globally. What can you discuss from your research?

 

 
 

 

 
 

 

 

CYB 100 Week 4 Discussion Question: Cryptography
 

 

 

Research how the company you chose might use cryptography to secure its communications.

Discuss the basic principles of cryptography in securing communications using examples from your research.

 

 
 

 

 
 

 

 

 

CYB 100 Week 5 Discussion Question: CIO and CISO Responsibilities
 

 

Describe the responsibilities of the Chief Information Security Officer (CISO) and Chief Information Officer (CIO) roles.

Discuss a scenario where the two roles could have divergent views on priorities when it comes to cybersecurity and asset allocation. How might the CIO and CISO work to resolve their conflicts?

Note: You may reference roles and responsibilities in the Week 5 assignment, “Roles in the Cyber Domain.”

 

 
 

 

 
 

 

CYB 100 Week 5 Discussion Question: Industry Security Certifications
 

 

Research the industry security certifications available in your area of career interest.

Discuss two industry security certifications applicable to your career. What are the advantages of having each of the two industry security certifications you chose to discuss?

Note: You may reference certifications in the week five assignment, “Roles in the Cyber Domain.”

 

 
 

 

 

You will get a ZIP (59KB) file

$ 2.00

$ 2.00

Buy Now

Discount has been applied.

Added to cart
or
Add to Cart
Adding ...