Koofers

CYB 110 Inspiring Minds/newtonhelp.com - Flashcards

Flashcard Deck Information

Class:CHLD 111 - Child Development Youth - Adolescence
Subject:Child Development
University:Citrus College
Term:Fall 2014
- of -
INCORRECT CORRECT
- INCORRECT     - CORRECT     - SKIPPED
Shuffle Remaining Cards Show Definitions First Take Quiz (NEW)
Hide Keyboard shortcuts
Next card
Previous card
Mark correct
Mark incorrect
Flip card
Start Over
Shuffle
      Mode:   CARDS LIST       ? pages   PRINT EXIT
CYB 110 All Assignments

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 1 Individual Protecting Data

 CYB 110 Week 1 Individual Security Policies

 CYB 110 Week 1 Individual Risk Management Framework and CIA

 CYB 110 Week 2 Individual Securing an Operating System

 CYB 110 Week 2 Individual Configuring Anti-Virus Software

 CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network

 CYB 110 Week 4 Individual Configuring Security on Mobile Devices

 CYB 110 Week 5 Individual Configure Backup Settings

 CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan

 CYB 110 Week 2 Individual Run/Playbook Part 1 Malware

 CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security

 CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

 CYB 110 Week 5 Individual  Playbook/Runbook Part 4 Secure Data Backup Guidelines

CYB 110 Week 1 Individual Protecting Data

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 1 Individual Protecting Data

There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks.

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.

In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

§ Confidentiality

§ Integrity

§ Availability

§ Some or all of the three (Confidentiality, Integrity, and/or Availability)

Include suggestions on how to counter each threat listed.

Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 1 Individual Risk Management Framework and CIA

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Risk Management Framework and CIA

In Ch. 1, "Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts.

Assume that a security model is needed for the protection of information in your class.

In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class. Submit your assignment using the Assignment Files tab.

CYB 110 Week 1 Individual Security Policies

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 1 Individual Security Policies

You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data.

Write a 1- to 2-page recommendation paper outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will increase data security.

Submit your assignment using the Assignment Files tab.

Generated by Koofers.com
CYB 110 Week 2 Individual Configuring Anti-Virus Software

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 2 Individual Configuring Anti-Virus Software

You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably increased, and all the impacted machines did not have updated anti-virus signatures. Your task is to set the anti-virus software to secure your company’s computers.

Note: Module 3 of Certified Secure Computer User details two options for anti-virus protection, Kaspersky and Avast anti-virus software.

Choose one of the following two options:

Option 1 (choose this option if you do not have Kaspersky or Avast anti-virus software on your machine):

§ Follow the directions given in Module 3 to install and configure Kaspersky or Avast anti-virus software on your machine.

§ Verify that virus definitions are current. Take a screenshot.

§ Run a scan of your machine. Take a screenshot of the results.

§ Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.

Option 2 (choose this option if you already have anti-virus software installed on your machine):

§ Verify that virus definitions are current. Take a screenshot.

§ Run a scan of your machine. Take a screenshot of the results.

§ Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 2 Individual Run/Playbook Part 1 Malware

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Run/Playbook Part 1 Malware

Create the first section of your Playbook/Runbook.

This week you researched malware, attack vectors, and how they are related to cybersecurity.

Write a 1- to 2-page scenario in which a malware attack occurs. Include the following:

      • Detail the particular malware, the exploited vulnerability, and its attack vector in

 

your scenario.

      • Provide a prescriptive series of steps you would utilize to deal with and mitigate the

 

attack.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 2 Individual Securing an Operating System

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 2 Individual Securing an Operating System

You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:

Windows:

1. Lock system when not in use

2. Create and change user account password

3. Disable Guest Account

4. Enable Automatic Software Updates

5. Enable Firewall

6. Create a New Firewall Rule

7. Turn on Windows Defender

8. Enable bitlocker

9. Decrypt file using EFS

10. Disable Unnecessary Services

Mac:

1. Lock system when not in use

2. Disable Automatic Login

3. Enable Automatic Software updates

4. Disable Guest Account

5. Enable FileVault

6. Enable Firewall

7. Change Password at set intervals

8. Enable and set parental controls

Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations.

Write a 1-page explanation on how and why these settings create a secure operating system.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Playbook/Runbook Part 2 Social Network Security

Add a 1- to 2-page section to your Playbook/Runbook that includes the following:

      • List of information and data employees are not to place online

      • Guidelines for interacting online

      • Guidelines for secure use of email

      • List of items staff at your company should not place on social media

Revise your previous week's Playbook/Runbook based on your

facilitator's feedback and submit as a complete document.

Submit your assignment using the Assignment Files tab.

Generated by Koofers.com
CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 3 Individual: Social Network Security – Configuring a Social Network

Your company encourages its employees to interact with the corporate Facebook page as a way to promote brand awareness and customer engagement. Your company wants employees to verify that their social media accounts are secure before engaging with a public corporate Facebook page that has thousands of users. Your task is to create a reference document demonstrating appropriate secure settings for Facebook.

Configure Facebook security settings as described, taking screenshots for each step:

1. Limit access to Work and Education info to “Friends” or “Only me.”

2. Set a strong password consisting of a passphrase that is alphanumeric, at least 10 characters, and includes a special character.

3. Select a separate “App Password” under Security Settings.

4. Adjust “Privacy Settings” to Friends.

5. Limit “Who can contact me” to “Friends of Friends” or “Friends.”

6. Adjust “Who can look me up” to “Friends of Friends” or “Friends.”

7. Set “Timeline and Tagging” to “Friends.”

8. Apply “Always Play Anonymously.”

9. Adjust “Ad Settings” to “No One.”

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 4 Individual Configuring Security on Mobile Devices

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 4 Individual: Configuring Security on Mobile Devices

Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices instead of purchasing corporate mobile devices for employees and contractors. As the Security Architect, you must provide Bring Your Own Device (BYOD) security best practice guidelines for employees to secure any personal mobile device used in the pilot program. Your task is to create a document demonstrating appropriate security settings.

Configure the mobile device security settings as follows, taking screenshots to demonstrate your knowledge:

Android or Apple:

1. Update your operating system and applications.

2. Encrypt phone with a strong passcode.

3. Back up your data.

4. Limit ad tracking under “Privacy, Advertising.”

5. Set up SIM card lock.

6. Disable Bluetooth and/or WiFi when not in use.

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and that definitions are current.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

Add a 1- to 2-page section to your Playbook/Runbook.

Create a prescriptive section of your Playbook providing guidelines to secure each of these areas:

    • Network connections

    • Mobile devices

    • Cloud services

Revise your previous week's Playbook/Runbook based on your facilitator's feedback and submit as a complete document.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 5 Individual Configure Backup Settings

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Configure Backup Settings

You want to ensure your personal computer is set to save data on a daily basis. Using OneDrive configure a personal computer to save and maintain data.

Configure backup settings as described below, taking screenshots to demonstrate your knowledge:

      • Schedule a daily backup to an external physical storage device.

      • Schedule a weekly backup to Microsoft OneDrive.

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and that definitions are current.

Submit your assignment using the Assignment Files tab.

Generated by Koofers.com
CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Disaster Recovery and Business Continuity Plan

You work for a multi-state company with three sites in three different

states, 1,000 employees, an ERP application with a backend database,

and two datacenters.

Prepare a 2- to 2.5-page Disaster Recovery and Business Continuity

Plan in Microsoft Word for your company. Include how you plan to:

• Recover your databases and telecommunications.

• Provide temporary office space for employees.

• Recover and provide employee PCs and other technology assets.

• Recover and provide any additional company assets.

Submit your assignment using the Assignment Files tab.

CYB 110 Week 5 Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual  Playbook/Runbook Part 4 Secure Data Backup Guidelines

NOTE: Only Part 4 is Included - Part 1, 2, & 3 Not Included.

 

Add a 1- to 2-page section to your Playbook/Runbook.

Outline guideline policies and procedures to back up and secure your company's data.

Revise your previous week's Playbook/Runbook based on your facilitator's feedback and compile as a complete document.

Submit your assignment using the Assignment Files tab.

Generated by Koofers.com

List View: Terms & Definitions

  Hide All 14 Print
 
Front
Back
 CYB 110 All Assignments

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 1 Individual Protecting Data

 CYB 110 Week 1 Individual Security Policies

 CYB 110 Week 1 Individual Risk Management Framework and CIA

 CYB 110 Week 2 Individual Securing an Operating System

 CYB 110 Week 2 Individual Configuring Anti-Virus Software

 CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network

 CYB 110 Week 4 Individual Configuring Security on Mobile Devices

 CYB 110 Week 5 Individual Configure Backup Settings

 CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan

 CYB 110 Week 2 Individual Run/Playbook Part 1 Malware

 CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security

 CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

 CYB 110 Week 5 Individual  Playbook/Runbook Part 4 Secure Data Backup Guidelines

 CYB 110 Week 1 Individual Protecting Data

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 1 Individual Protecting Data

There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks.

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.

In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

§ Confidentiality

§ Integrity

§ Availability

§ Some or all of the three (Confidentiality, Integrity, and/or Availability)

Include suggestions on how to counter each threat listed.

Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 1 Individual Risk Management Framework and CIA

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Risk Management Framework and CIA

In Ch. 1, "Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts.

Assume that a security model is needed for the protection of information in your class.

In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class. Submit your assignment using the Assignment Files tab.

 CYB 110 Week 1 Individual Security Policies

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 1 Individual Security Policies

You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data.

Write a 1- to 2-page recommendation paper outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will increase data security.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 2 Individual Configuring Anti-Virus Software

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 2 Individual Configuring Anti-Virus Software

You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably increased, and all the impacted machines did not have updated anti-virus signatures. Your task is to set the anti-virus software to secure your company’s computers.

Note: Module 3 of Certified Secure Computer User details two options for anti-virus protection, Kaspersky and Avast anti-virus software.

Choose one of the following two options:

Option 1 (choose this option if you do not have Kaspersky or Avast anti-virus software on your machine):

§ Follow the directions given in Module 3 to install and configure Kaspersky or Avast anti-virus software on your machine.

§ Verify that virus definitions are current. Take a screenshot.

§ Run a scan of your machine. Take a screenshot of the results.

§ Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.

Option 2 (choose this option if you already have anti-virus software installed on your machine):

§ Verify that virus definitions are current. Take a screenshot.

§ Run a scan of your machine. Take a screenshot of the results.

§ Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 2 Individual Run/Playbook Part 1 Malware

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Run/Playbook Part 1 Malware

Create the first section of your Playbook/Runbook.

This week you researched malware, attack vectors, and how they are related to cybersecurity.

Write a 1- to 2-page scenario in which a malware attack occurs. Include the following:

      • Detail the particular malware, the exploited vulnerability, and its attack vector in

 

your scenario.

      • Provide a prescriptive series of steps you would utilize to deal with and mitigate the

 

attack.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 2 Individual Securing an Operating System

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 2 Individual Securing an Operating System

You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:

Windows:

1. Lock system when not in use

2. Create and change user account password

3. Disable Guest Account

4. Enable Automatic Software Updates

5. Enable Firewall

6. Create a New Firewall Rule

7. Turn on Windows Defender

8. Enable bitlocker

9. Decrypt file using EFS

10. Disable Unnecessary Services

Mac:

1. Lock system when not in use

2. Disable Automatic Login

3. Enable Automatic Software updates

4. Disable Guest Account

5. Enable FileVault

6. Enable Firewall

7. Change Password at set intervals

8. Enable and set parental controls

Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations.

Write a 1-page explanation on how and why these settings create a secure operating system.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 3 Individual Playbook/Runbook Part 2 Social Network Security

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Playbook/Runbook Part 2 Social Network Security

Add a 1- to 2-page section to your Playbook/Runbook that includes the following:

      • List of information and data employees are not to place online

      • Guidelines for interacting online

      • Guidelines for secure use of email

      • List of items staff at your company should not place on social media

Revise your previous week's Playbook/Runbook based on your

facilitator's feedback and submit as a complete document.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 3 Individual: Social Network Security – Configuring a Social Network

Your company encourages its employees to interact with the corporate Facebook page as a way to promote brand awareness and customer engagement. Your company wants employees to verify that their social media accounts are secure before engaging with a public corporate Facebook page that has thousands of users. Your task is to create a reference document demonstrating appropriate secure settings for Facebook.

Configure Facebook security settings as described, taking screenshots for each step:

1. Limit access to Work and Education info to “Friends” or “Only me.”

2. Set a strong password consisting of a passphrase that is alphanumeric, at least 10 characters, and includes a special character.

3. Select a separate “App Password” under Security Settings.

4. Adjust “Privacy Settings” to Friends.

5. Limit “Who can contact me” to “Friends of Friends” or “Friends.”

6. Adjust “Who can look me up” to “Friends of Friends” or “Friends.”

7. Set “Timeline and Tagging” to “Friends.”

8. Apply “Always Play Anonymously.”

9. Adjust “Ad Settings” to “No One.”

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 4 Individual Configuring Security on Mobile Devices

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 4 Individual: Configuring Security on Mobile Devices

Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices instead of purchasing corporate mobile devices for employees and contractors. As the Security Architect, you must provide Bring Your Own Device (BYOD) security best practice guidelines for employees to secure any personal mobile device used in the pilot program. Your task is to create a document demonstrating appropriate security settings.

Configure the mobile device security settings as follows, taking screenshots to demonstrate your knowledge:

Android or Apple:

1. Update your operating system and applications.

2. Encrypt phone with a strong passcode.

3. Back up your data.

4. Limit ad tracking under “Privacy, Advertising.”

5. Set up SIM card lock.

6. Disable Bluetooth and/or WiFi when not in use.

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and that definitions are current.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

For more course tutorials visit

www.newtonhelp.com

 

 

 

CYB 110 Week 4 Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines

Add a 1- to 2-page section to your Playbook/Runbook.

Create a prescriptive section of your Playbook providing guidelines to secure each of these areas:

    • Network connections

    • Mobile devices

    • Cloud services

Revise your previous week's Playbook/Runbook based on your facilitator's feedback and submit as a complete document.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 5 Individual Configure Backup Settings

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Configure Backup Settings

You want to ensure your personal computer is set to save data on a daily basis. Using OneDrive configure a personal computer to save and maintain data.

Configure backup settings as described below, taking screenshots to demonstrate your knowledge:

      • Schedule a daily backup to an external physical storage device.

      • Schedule a weekly backup to Microsoft OneDrive.

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and that definitions are current.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 5 Individual Disaster Recovery and Business Continuity Plan

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual Disaster Recovery and Business Continuity Plan

You work for a multi-state company with three sites in three different

states, 1,000 employees, an ERP application with a backend database,

and two datacenters.

Prepare a 2- to 2.5-page Disaster Recovery and Business Continuity

Plan in Microsoft Word for your company. Include how you plan to:

• Recover your databases and telecommunications.

• Provide temporary office space for employees.

• Recover and provide employee PCs and other technology assets.

• Recover and provide any additional company assets.

Submit your assignment using the Assignment Files tab.

 CYB 110 Week 5 Individual Playbook/Runbook Part 4 Secure Data Backup Guidelines

For more course tutorials visit

www.newtonhelp.com

 

 

 

Individual  Playbook/Runbook Part 4 Secure Data Backup Guidelines

NOTE: Only Part 4 is Included - Part 1, 2, & 3 Not Included.

 

Add a 1- to 2-page section to your Playbook/Runbook.

Outline guideline policies and procedures to back up and secure your company's data.

Revise your previous week's Playbook/Runbook based on your facilitator's feedback and compile as a complete document.

Submit your assignment using the Assignment Files tab.

36, "/var/app/current/tmp/"