CYB 110 All Assignments
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA CYB 110 Week 2 Individual Securing an Operating System CYB 110 Week 2 Individual Configuring Anti-Virus Software CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network CYB 110 Week 4 Individual Configuring Security on Mobile Devices CYB 110 Week 5 Individual Configure Backup Settings CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan CYB 110 Week 2 Individual Run/Playbook Part 1 Malware CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security
CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines CYB 110 Week 5 Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines
------------------------------------------------------
CYB 110 All Discussion (New Syllabus)
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 1 Discussion Data breach (New Syllabus) CYB 110 Week 2 Discussion Antivirus Software (New Syllabus) CYB 110 Week 3 Discussion Online Email Attachments (New Syllabus) CYB 110 Week 4 Discussion Security Measures (New Syllabus) CYB 110 Week 5 Discussion CSCU Exam (New Syllabus) CYB 110 Week 1 Discussion Secure Environment CYB 110 Week 2 Discussion Malware CYB 110 Week 3 Discussion Online Interaction Risks
CYB 110 Week 4 Discussion Bring Your Own Device CYB 110 Week 5 Discussion Data Backup Procedures ------------------------------------------------------
CYB 110 Apply Week 1 Threats to Confidentiality, Integrity, and Availability (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Threats to Confidentiality, Integrity, and Availability Assignment Content There are many different threats to the confidentiality, integrity and availability of data-at-rest, data-in-transit, and processing Some threats affect one of these security risks like confidentiality only, and some threats affect more than one or even all these risks. Create a 1-to 2-page table in Microsoft Word, listing a minimum of 6 threats using the column headers and details below: - Title Page • Introduction paragraph(s) - Threat - List the threat. - Threat to Type of Data (data-at-rest.data-in-transitor processing) - Identify the type, - Confidentiality/Integrity/Availability -Identify whether some or all are affected by labelling: C. Land/or. - Mitigation Suggestion - Describe a mitigation plan in 2-3 sentences. .
Conclusions . References Example: Threat: Password Compromise Threat to Type of Deta: DotoAr-Rest Confidentiality/Integrity/Availability: CL&A Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk Include a short paragraph that highlights two access control techniques or policies that enforce security, Cite at least two resources within the assignment in APA format. Submit your assignment. You must use an assignment template if one is provides under the course resources. ------------------------------------------------------
CYB 110 Apply Week 2 Malware Attacks (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Wk 2 Apply Malware Attacks Assignment Content Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are
often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams: all of which make it easy to follow troubleshooting instructions. Throughout the next four weeks. you will develop a series of playbooks for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company. Outline a 2-to 3-page playbook in which a malware attack of your choice occurs. Include the following information: Title Page Introduction paragraph(s) Details of the malware paragraph(s). The exploited vulnerability and its attack vector paragraph(s) Two risks of this malware paragraph(s) Step-by-step instructions on how to resolve the malware attack. Provide a prescriptive series of steps/checklist items with instructions you would utilize to deal with and mitigate the attack. Conclusions paragraph(s) References list Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines Cite at least two resources within the assignment in APA format Submit your assignment. You must use an assignment template if one is provides under the course resources ------------------------------------------------------
CYB 110 Apply Week 3 Online Interactions (New Syllabus)
For more course tutorials visit www.newtonhelp.com
CYB 110 Apply Week 3 Online Interactions Assignment Content Online interactions pose a threat to all servers. There are risks that occur when employees use social networking web browsing and email. Playbooks typically cover a section related to threats and defenses of online interactions. In this next section of your series of playbooks, outline steps to take when an employee reports clicking on a website that appeared in an email that was received Include the following information in this section Title Page • Introduction paragraph(s) Descriptions of two threats this interaction poses on the company Step-by-step instructions on how to mitigate each interaction. Provide a prescriptive series of steps/checklist items with instructions you would utilize to deal with and mitigate the attack. . Conclusions paragraph(s) References list Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines Cite at least two resources within the assignment in APA format. Submit your assignment. You must use an assignment template if one is provides under the course resources,
------------------------------------------------------
CYB 110 Apply Week 4 Mobile Security (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches. Create a visual poster or infographic to display in the company’s break room. Include the following information:
At least two mobile device threats List of ideal mobile security settings to defend against threats Brief instructions for setting up at least two security settings An explanation on what happens mobile devices are not secured from these threats Appropriate images and graphics Two resources for more information on mobile security, with appropriate citations
------------------------------------------------------
CYB 110 Apply Week 5 Backup Policies (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans. In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible. Include the following in your outline:
A list of tools used for backup purposes An explanation of the following: Where employees should work from that day How employees can get to their data The communication methods about updates A step-by-step guide to recover your databases and telecommunications A step-by-step guide to recover and provide any additional company assets A description of policies for backup media storage A description of policies for encryption of backup data
Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines. Cite at least two resources within the assignment in APA format. ------------------------------------------------------
CYB 110 Entire Course (New Syllabus)
CYB-110-Entire-Course-(New-Syllabus)
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 1 Discussion Data breach (New Syllabus) CYB 110 Apply Week 1 Threats to Confidentiality, Integrity, and Availability (New Syllabus) CYB 110 Week 1 Practice Practicelabs Microsoft Security Fundamentals (New Syllabus) CYB 110 Week 2 Discussion Antivirus Software (New Syllabus) CYB 110 Apply Week 2 Malware Attacks (New Syllabus) CYB 110 Week 3 Discussion Online Email Attachments (New Syllabus) CYB 110 Apply Week 3 Online Interactions (New Syllabus) CYB 110 Week 4 Discussion Security Measures (New Syllabus) CYB 110 Apply Week 4 Mobile Security (New Syllabus) CYB 110 Week 5 Discussion CSCU Exam (New Syllabus) CYB 110 Apply Week 5 Backup Policies (New Syllabus) ------------------------------------------------------
CYB 110 Week 1 Discussion Data breach (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words.
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take? How does the type of data breach affect the actions? Select one type of data breach and the course of action that should be taken.
------------------------------------------------------
CYB 110 Week 1 Discussion Secure Environment
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words:
Research Playbook/Runbooks and the role they play in security. Discuss how a Playbook/Runbook relates to creating a secure environment and why policies are important for enforcing security. ------------------------------------------------------
CYB 110 Week 1 Individual Protecting Data
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 1 Individual Protecting Data There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks. Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected: Confidentiality Integrity Availability Some or all of the three (Confidentiality, Integrity, and/or Availability) Include suggestions on how to counter each threat listed.
Place your list in the 3 columns of a table in a MicrosoftÂŽ Word or ExcelÂŽ document. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 1 Individual Risk Management Framework and CIA
For more course tutorials visit www.newtonhelp.com
Individual Risk Management Framework and CIA In Ch. 1, "Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts. Assume that a security model is needed for the protection of information in your class. In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 1 Individual Security Policies
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 1 Individual Security Policies You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data. Write a 1- to 2-page recommendation paper outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will increase data security. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 1 Practice Practicelabs Microsoft Security Fundamentals (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Microsoft Security Fundamentals
cyb 110 week 1 practice practicelabs microsoft security fundamentals (new syllabus) ------------------------------------------------------
CYB 110 Week 2 Discussion Antivirus Software (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words. Emma won a laptop at her high school science fair. The laptop does not have antivirus software installed on it so Emma must purchase one. She’ll be using the laptop for college applications, schoolwork, and hopefully next year as a college freshman. Respond to the following in a minimum of 175 words:
What top two factors should Emma keep in mind before purchasing the software? Why are these the top factors to consider? Where should she make the purchase?
------------------------------------------------------
CYB 110 Week 2 Discussion Malware
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words: Research different types of malware, looking at specific examples and how they affected an organization. List examples of malware that pose threats to individuals or companies and their attack vectors. Discuss how companies or individuals can protect themselves from these malware examples ------------------------------------------------------
CYB 110 Week 2 Individual Configuring Anti-Virus Software
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 2 Individual Configuring Anti-Virus Software You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably increased, and all the impacted machines did not have updated anti-virus signatures. Your task is to set the anti-virus software to secure your company’s computers.
Note: Module 3 of Certified Secure Computer User details two options for anti-virus protection, Kaspersky and Avast anti-virus software. Choose one of the following two options: Option 1 (choose this option if you do not have Kaspersky or Avast antivirus software on your machine): Follow the directions given in Module 3 to install and configure Kaspersky or Avast anti-virus software on your machine. Verify that virus definitions are current. Take a screenshot. Run a scan of your machine. Take a screenshot of the results. Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current. Option 2 (choose this option if you already have anti-virus software installed on your machine): Verify that virus definitions are current. Take a screenshot. Run a scan of your machine. Take a screenshot of the results. Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 2 Individual Run/Playbook Part 1 Malware
For more course tutorials visit www.newtonhelp.com
Individual Run/Playbook Part 1 Malware Create the first section of your Playbook/Runbook.
This week you researched malware, attack vectors, and how they are related to cybersecurity. Write a 1- to 2-page scenario in which a malware attack occurs. Include the following: • Detail the particular malware, the exploited vulnerability, and its attack vector in your scenario. • Provide a prescriptive series of steps you would utilize to deal with and mitigate the attack. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 2 Individual Securing an Operating System
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 2 Individual Securing an Operating System You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step: Windows: 1. Lock system when not in use
2. Create and change user account password 3. Disable Guest Account 4. Enable Automatic Software Updates 5. Enable Firewall 6. Create a New Firewall Rule 7. Turn on Windows Defender 8. Enable bitlocker 9. Decrypt file using EFS 10. Disable Unnecessary Services Mac: 1. Lock system when not in use 2. Disable Automatic Login 3. Enable Automatic Software updates 4. Disable Guest Account 5. Enable FileVault 6. Enable Firewall 7. Change Password at set intervals 8. Enable and set parental controls Paste screenshots into a MicrosoftÂŽ Word document to demonstrate you applied the configurations. Write a 1-page explanation on how and why these settings create a secure operating system. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 3 Discussion Online Email Attachments (New Syllabus)
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words. Richard received an email from a person claiming to be his childhood friend, Kate. The email address is unknown to Richard, but the subject says that it is Kate’s new email address. It also has an attachment, which according to the subject, is a childhood picture of them. Respond to the following in a minimum of 175 words:
What steps should Richard take to verify the authenticity of Kate’s new email ID? How should Richard make sure that the attachment is not malicious?
------------------------------------------------------
CYB 110 Week 3 Discussion Online Interaction Risks
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words: Retail stores often directly interact with customers online. Staff can also indirectly interact with the public online through their private social media. Discuss risks online interactions pose to a company. How can
companies ensure appropriate interaction is taking place and balance that with security? ------------------------------------------------------
CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security
For more course tutorials visit www.newtonhelp.com
Individual Playbook/Runbook Part 2 Social Network Security Add a 1- to 2-page section to your Playbook/Runbook that includes the following: • List of information and data employees are not to place online • Guidelines for interacting online • Guidelines for secure use of email • List of items staff at your company should not place on social media Revise your previous week's Playbook/Runbook based on your facilitator's feedback and submit as a complete document. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network
For more course tutorials visit
www.newtonhelp.com
CYB 110 Week 3 Individual: Social Network Security – Configuring a Social Network Your company encourages its employees to interact with the corporate Facebook page as a way to promote brand awareness and customer engagement. Your company wants employees to verify that their social media accounts are secure before engaging with a public corporate Facebook page that has thousands of users. Your task is to create a reference document demonstrating appropriate secure settings for Facebook. Configure Facebook security settings as described, taking screenshots for each step: 1. Limit access to Work and Education info to “Friends” or “Only me.” 2. Set a strong password consisting of a passphrase that is alphanumeric, at least 10 characters, and includes a special character. 3. Select a separate “App Password” under Security Settings. 4. Adjust “Privacy Settings” to Friends. 5. Limit “Who can contact me” to “Friends of Friends” or “Friends.” 6. Adjust “Who can look me up” to “Friends of Friends” or “Friends.” 7. Set “Timeline and Tagging” to “Friends.” 8. Apply “Always Play Anonymously.” 9. Adjust “Ad Settings” to “No One.” Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 4 Discussion Bring Your Own Device
For more course tutorials visit www.newtonhelp.com
Your company is thinking of introducing a Bring Your Own Device (BYOD) policy. You have been tasked with assessing the risks associated with this implementation, including how to manage malware, data leakage, and access control. Research threats and vulnerabilities by mobile and other devices introduced to networks through BYOD policies. Discuss the following:  
What risks do these devices pose? How do you manage BYODs in a secure way to prevent malware, data leakage, and control access?
------------------------------------------------------
CYB 110 Week 4 Discussion Security Measures (New Syllabus)
For more course tutorials visit www.newtonhelp.com
shereen works as an executive reporter for news todays. the assignment in which she is currently working on will expose a major
cover up at the mayors office. all the information shereen has gathered is stored on her phone, She is worried that someone may attempt to steal the phone in order to stop the story Respond to the following in a minimum of 175 words. What are two security measures shereen can take to secure her mobile device? Describe how to setup these security measures ------------------------------------------------------
CYB 110 Week 4 Individual Configuring Security on Mobile Devices
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 4 Individual: Configuring Security on Mobile Devices Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices instead of purchasing corporate mobile devices for employees and contractors. As the Security Architect, you must provide Bring Your Own Device (BYOD) security best practice guidelines for employees to secure any personal mobile device used in the pilot program. Your task is to create a document demonstrating appropriate security settings. Configure the mobile device security settings as follows, taking screenshots to demonstrate your knowledge: Android or Apple:
1. Update your operating system and applications. 2. Encrypt phone with a strong passcode. 3. Back up your data. 4. Limit ad tracking under “Privacy, Advertising.” 5. Set up SIM card lock. 6. Disable Bluetooth and/or WiFi when not in use. Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and that definitions are current. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines
For more course tutorials visit www.newtonhelp.com
CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines Add a 1- to 2-page section to your Playbook/Runbook. Create a prescriptive section of your Playbook providing guidelines to secure each of these areas: • Network connections • Mobile devices • Cloud services
Revise your previous week's Playbook/Runbook based on your facilitator's feedback and submit as a complete document. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 5 Discussion CSCU Exam (New Syllabus)
For more course tutorials visit www.newtonhelp.com
The Certified Secure Computer User (CSCU) exam is designed for those who use the internet for work, study, or play. Respond to the following in a minimum of 175 words: • How could this industry certification benefit you and your personal career goals? • What are two other resources you can use to prepare for this exam besides the materials provided in this course? ------------------------------------------------------
CYB 110 Week 5 Discussion Data Backup Procedures
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words: The university you work for has several different functional areas that maintain student information and data (e.g., registrar, accounting, financial aid, academic departments, etc.). Discuss what role backup policies and procedures play in protecting an organization with many different departments and their data. Why is it important to back up data? What are some examples of secure policies and procedures that could be used in this scenario to protect student information? ------------------------------------------------------
CYB 110 Week 5 Individual Configure Backup Settings
For more course tutorials visit www.newtonhelp.com
Individual Configure Backup Settings You want to ensure your personal computer is set to save data on a daily basis. Using OneDrive configure a personal computer to save and maintain data. Configure backup settings as described below, taking screenshots to demonstrate your knowledge: • Schedule a daily backup to an external physical storage device. • Schedule a weekly backup to Microsoft OneDrive.
Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and that definitions are current. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan
For more course tutorials visit www.newtonhelp.com
Individual Disaster Recovery and Business Continuity Plan You work for a multi-state company with three sites in three different states, 1,000 employees, an ERP application with a backend database, and two datacenters. Prepare a 2- to 2.5-page Disaster Recovery and Business Continuity Plan in Microsoft Word for your company. Include how you plan to: • Recover your databases and telecommunications. • Provide temporary office space for employees. • Recover and provide employee PCs and other technology assets. • Recover and provide any additional company assets. Submit your assignment using the Assignment Files tab. ------------------------------------------------------
CYB 110 Week 5 Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines
For more course tutorials visit www.newtonhelp.com
Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines NOTE: Only Part 4 is Included - Part 1, 2, & 3 Not Included. Add a 1- to 2-page section to your Playbook/Runbook. Outline guideline policies and procedures to back up and secure your company's data. -----------------------------------------------------Revise your previous week's Playbook/Runbook based on your facilitator's feedback and compile as a complete document. Submit your assignment using the Assignment Files tab.