Refer a friend and get % off! They'll get % off too.

CIS 297 Entire Course

CIS 297 Entire Course

COMPUTER SECURITY AND OPERATIONAL SUPPORT FUNDAMENTALS

 

The Latest Version A+ Study Guide

CIS 297 Week 1 Individual: Security Audit Checklist
 

You work at a small company with a single location. One of your responsibilities is to control and protect IT assets.

Create a security audit checklist used to ensure the physical security of the company’s IT assets.

Include the following in your checklist:

 

 

 

What to physically inspect
 

 

Which methods should be used to ensure assets remain in the building; e.g., Radio Frequency Identification (RFID)
 

 

The fundamental policies to be followed to minimize unauthorized access to assets
 

 

How you would check for compliance
 

 

 

Document your checklist using:

 

 

 

A 1- to 2-page Microsoft® Word document
 

 

 

Submit your assignment to the Assignment Files tab.

 

 
 

 

CIS 297 Week 1 Individual: Individual Security Vulnerability
 

You purchased a used computer from a friend. You want to ensure the computer, your network, and data are secure once you start using it.

Describe the actions you will take to identify and address any potential issues that could affect the security of your computer system, network, and data. For example, you may review what wireless access points are configured and update or remove those not within your network.

Document your plan in a 1-page Microsoft® Word document.

Submit your assignment to the Assignment Files tab.

 

 
 

 

CIS 297 Week 2 Individual: Troubleshooting Fishbone Diagram
 

Resources:

 

 

 

“Fishbone Diagram” subsection of the “More Techniques in a Nutshell” section of the Creative Problem Solving and Decision Making Techniques Pluralsight course by Milena Pajic.
 

 

“How to Use the Fishbone Diagram” video in the Lynda.com® course Project Management Foundations: Leading Projects.
 

 

“Get to the Root of the Problem” article in Week One Electronic Reserve Readings.
 

 

 

You work in an IT support department. You receive a call with the following complaint:

“When I start up my system, I see the login screen, but before I can enter my username, the system shuts down.”

Create a fishbone diagram that identifies the steps you would use to identify and resolve the issue.

Use Microsoft® Visio®, PowerPoint® or Word to create your diagram.

Submit your assignment to the Assignment Files tab.

 

 

CIS 297 Week 2 Individual: NC Organization Security Recommendations
 

Resource:

 

 

 

Account Permissions document
 

 

 

Define security recommendations for NC Organization that addresses the following:

 

 

 

The software and hardware that should be used to counter likely security threats
 

 

Account and user group definitions
 

 

Standard individual user and network system settings
 

 

Patch management suggestions
 

 

Encryption ideas
 

 

 

Present your recommendations using:

 

 

 

A 1- to 2-page paper using Microsoft® Word
 

 

 

Submit your assignment to the Assignment Files tab.

 

 

CIS 297 Week 3 Individual: Mobile Security Job Aid
 

NC Organization wants to provide information about maintaining device and data security to all employees who use personal and corporate-owned mobile devices.

Create a job aid that will provide employees with the following:

 

 

 

Best practices for maintaining physical security of the device
 

 

Best practices for maintaining information and data security when using the device
 

 

Ensuring device and app settings comply with organization standards
 

 

Guidelines for setting file encryption
 

 

Procedures to ensure data synchronization between device and corporate servers
 

 

Procedures to follow when a device is lost
 

 

 

Create your job aid as a chart, procedures document, or digital poster using Microsoft® Word or Microsoft® PowerPoint®.

Note: A digital poster is similar to a poster created on poster board, except it is digitally created. A digital poster can include a mix of elements such as narrative content, images, videos, and graphs.

 

 

CIS 297 Week 3 Individual: BYOD vs. CYOD
 

Resource:

 

 

 

“Managing a Mobile Workforce” article in Week Three Electronic Reserve Readings
 

 

 

Compare the use of a bring-your-own-device (BYOD) policy and a choose-your-own-device (CYOD) policy in the work place.

Identify the advantages and disadvantages to the organization and individual employees.

Include accessibility and user permission considerations necessary to protect data on mobile devices.

Document your findings using:

 

 

 

A 1-page Microsoft® Word document
 

 

 

Submit your assignment to the Assignment Files tab.

 

 

CIS 297 Week 4 Individual: Protecting Digital Data
 

You discussed unauthorized access to NC Organization controlled data via lost and stolen devices in your Learning Team Collaboration. However, unauthorized data access can occur through numerous methods.

Research other manners in which unauthorized users could access NC Organization’s digital data.

Consider how access could occur through usage of electronic data, electronic data storage, transmission, and destruction.

Identify five methods in which unauthorized users could access data controlled by NC Organization.

For each method, define policy and best work practice recommendations to ensure inadvertent and malicious access does not occur.

Present your recommendations in:

 

 

 

A 1- to 2-page paper using Microsoft® Word
 

 

 

Submit your assignment to the Assignment Files tab.

 

 

CIS 297 Week 4 Individual: Hard Data and Hardware Destruction
 

Balancing environmental, safety, efficiency, and data security considerations can be difficult.

Review the following examples:

 

 

 

Allowing employees to take printer cover pages for their children’s art projects may seem benign. Consider, however, what if that printer header contained information that could be used to access the company’s network?
 

 

Donating outdated computers to community organizations is a common practice. However, what if data on hard drives is still present?
 

 

Having a central bin for materials to be shredded may be less expensive than having several smaller bins located around the office. However, what if employees are unable or unwilling to take the extra trip, where will hard copies end up?
 

 

 

Identify five methods in which an organization’s data could be accessed via hard copy or hardware. Include at least one of each type. For each method, describe the following:

 

 

 

Policies and best work practices to ensure inadvertent and malicious access does not occur
 

 

How this method addresses employee and environmental safety concerns
 

 

 

Present your findings and recommendations in:

 

 

 

A 2-page paper using Microsoft® Word
 

 

 

Submit your assignment to the Assignment Files tab.

 

 

CIS 297 Week 5 Individual: Hybrid Network Design
 

You have a meeting with NC Organization to discuss the design of its SOHO hybrid network.

Create a sample diagram of the network design. Include the following in the diagram:

 

 

 

Six workstations
 

 

Two printers
 

 

Six mobile devices
 

 

 

Describe the following either within the diagram or in a supplemental document:

 

 

 

Devices
 

 

Software versions and current patch levels
 

 

Connectivity requirements (e.g., wireless or direct connect)
 

 

Level of authentication required for mobile devices
 

 

Security elements
 

 

 

Use Microsoft® Visio® or Microsoft® PowerPoint® to create your diagram. You may use Microsoft® Word to provide supplemental text if needed.

Submit your assignment to the Assignment Files tab.

 

 
 

 

CIS 297 Week 5 Individual: SOHO Network Security Requirements
 

Your organization is opening a new office. The new office has the following hardware and network specifications:

 

 

 

A hybrid network
 

 

Ten workstations
 

 

Three tablets
 

 

One shared printer
 

 

One personal printer for the office manager
 

 

A Server
 

 

An external hard drive for backups (network attached)
 

 

 

Define the security requirements this organization will need, along with the network, hardware, and software components, for both a public- and private-facing network.

Present your recommendations in one of the following ways:

 

 

 

A 1- to 2-page paper using Microsoft® Word
 

 

A 10- to 12-slide Microsoft® PowerPoint® presentation with detailed speaker notes and appropriate animations
 

 

 

Submit your assignment to the Assignment Files tab.

You will get a ZIP (24MB) file

$ 49.00

$ 49.00

Buy Now

Discount has been applied.

Added to cart
or
Add to Cart
Adding ...