Refer a friend and get % off! They'll get % off too.

CMGT 433 All Discussions

CMGT 433 All Discussions


The Latest Version 

CMGT 433 Wk 1 Discussion – Security Requirements Related to Mobile and Cloud Computing
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Overall, there is a trend in organizations to incorporate the internet into many of their operations, especially related to mobile and cloud computing. This trend requires security managers and/or analysts to realize that there are additional security requirements regarding the cyber environment.

Provide one way that cybersecurity requirements differ from traditional enterprise security requirements. How does this requirement affect the way you protect data? Provide a real-life example of a cybersecurity failure.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

CMGT 433 Wk 2 Discussion – Threat Modeling
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

The SDLC (software/system development life cycle) framework, where security is often addressed only during the testing phase, is sometimes used by organizations. However, that practice has many flaws, especially the failure to identify threats and/or vulnerabilities because testing is done so late in the framework.

How can you include threat modeling within your SSDLC? At what points of the lifecycle would you include threats? Why would you do it then instead of another phase?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

 

CMGT 433 Wk 3 Discussion – Network Security Strategy
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the network consists of 2 servers for internal business processes, 1 server that handles the call-in connections; 10 on-site wireless workstations/devices, and 2 printers.

Identify one network security strategy that would help this organization. Why did you choose this strategy over others?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

 

 

CMGT 433 Wk 4 Discussion – Security Audit Groups
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

During a security audit, it has been promoted that it is important to include all end users, which would involve all staff and also your customer or client base. There are risks for both of those groups that are not included in the IT or Audit department. Who do you exclude from the security audit?

Provide at least two supporting arguments for excluding this group.

 Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 
 

 

 
 

 

 

 

CMGT 433 Wk 5 Discussion – Security Policies
 

 

 
 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Many organizations lack a clear and concise security policy. Without a policy there is often an inconsistency in security focus by employees and management and increased opportunities for experiencing security incidents.

Search the internet for two companies’ policies. Analyze the policies to determine commonalities. What would be your top three concepts that should be included in an organizational security policy mission statement? Explain your reasoning for your listed three concepts.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

You will get a ZIP (53KB) file

$ 12.00

$ 12.00

Buy Now

Discount has been applied.

Added to cart
or
Add to Cart
Adding ...