Refer a friend and get % off! They'll get % off too.

CYB 205 All Discussions

CYB 205 All Discussions

The Latest Version

 

 

CYB 205 week 1 Discussion Question: Asset Management
 

 

 

Asset management is an important part of information security. Without knowing what assets you have, you cannot begin to secure them. But what is an asset?

Discuss the various types of assets a company might have, how they might be inventoried, and the potential threats to the various assets.

 

 
 

 

 
 

 

 
 

 

 

 

CYB 205 week 1 Discussion Question: Vulnerabilities
 

 

Vulnerabilities can exist in both a business’ software and hardware.

Discuss the differences between software and hardware vulnerabilities. How might these vulnerabilities impact a business?

 

 
 

 

 
 

 

 

 

CYB 205 week 2 Discussion Question: Threats to Data and Systems
 

 

 
 

Threats to data cannot be fully evaluated without knowing where information resides. A decade ago, all information was stored on servers in secure data centers accessible only on a company’s network. Today, datacenters could be on the premises or in the cloud and the data might be accessible from anywhere.

Research threats to modern information systems.

Share two different threats specific to data or to the systems hosting it. Discuss the threats in your classmates’ posts.

 

 
 

 

 
 

 

 

 

CYB 205 week 2 Discussion Question: Examples of Threats
 

 

 
 

Today’s datacenters are populated with not only physical hardware but systems hosting virtual machines and containers. These systems communicate locally and around the globe over networks.

Discuss two different examples of threats to various parts of heterogeneous architectures and how they might manifest. Do not forget about the hardware, operating systems, applications, networks, and other integral parts. Discuss the threats in your classmates’ posts.

 

 
 

 

 
 

 

 

 

CYB 205 week 3 Discussion Question: Cryptography
 

 

 
 

Cryptography has been around for millennia. Modern digital crypto systems are more robust than ever before.

Explain cryptography. Discusshow a modern encryption system is used to protect data and data use.

 

 
 

 

 
 

 

 

CYB 205 week 3 Discussion Question: Malware
 

 

 
 

Malware is an all-encompassing term for code which might perform malicious or unwanted functions on your system. It could include viruses, Trojans, worms, ransomware, rootkits, bots, and even adware.

Discuss potential defenses against malware. What is your experience with malware?

 

 
 

 

 
 

 

 

CYB 205 week 4 Discussion Question: Policies
 

 

 
 

Policies are a critical backbone to any information security program.

Research and discuss some of the elements necessary in modern information security policies for both on-premise systems and cloud-based services.

Respond to the policies presented by your classmates.

 

 
 

 

 
 

 

 

CYB 205 week 4 Discussion Question: Controls
 

 

 
 

Controls are countermeasures used to treat risks. Within the categories of administrative or technical controls, there can be preventative, detective, and responsive types of controls.

Research a specific control, and discuss how it differs from the other technical controls.

Example: An appropriate use policy could be an administrative preventative control.

 

 
 

 

 
 

 

 

CYB 205 week 5 Discussion Question: Cloud BC/DRP
 

 

Cloud-based systems and services are often ideal options for critical parts of a Business Continuity (BC) or Disaster Recovery Plan (DRP).

Research some of the ways this is being done today.

Discuss how cloud-based systems support business continuity.  How can potential risks be transferred to cloud providers?

Note: This information can be applied to the Week Five Individual Assignment, “Business Continuity and the Cloud.”

 

 
 

 

 
 

 

 

CYB 205 week 5 Discussion Question: Cloud-Based Risks
 

 

 
 

While the cloud-based systems and services are often ideal options for business continuity, these systems also come with risks.

Research some of the risks associated with a particular use of cloud services.

Discuss the differences between the IT risks faced by cloud-based services and a local datacenter.

Note: This information can be applied to the Week Five Individual Assignment, “Business Continuity and the Cloud.”

 

 
 

 

 
 

 

You will get a ZIP (56KB) file

$ 15.00

$ 15.00

Buy Now

Discount has been applied.

Added to cart
or
Add to Cart
Adding ...