Week 10 Discussion – Reflection on Labs

For the lab from which you learned the most: Describe the single most important lesson you learned from completing this lab. Explain how you will apply this lesson in your current position or one you hope to obtain. For the lab from which you learned the least: Explain what you hoped to learn from completing … Read more

Week 7 – Evaluate Automated IT Security Policy Compliance Systems

   Assume you are a security professional for a supplier of military products to the U.S. Department of Defense (DoD). Your organization has approximately 7,000 workers, which are located across the United States in 35 locations. You also have contractors. A recent security breach exposed flaws in your company’s Internet use policy and physical access … Read more

Week 11 Discussion – What’s Next?

Suppose you have graduated from Strayer University with your degree and you have been working on a variety of projects. Now, you are ready to pursue a certification in project management, but you are not sure which one to get. While visiting the Project Management Institute’s (PMI) CertificationsLinks to an external site. website, you see … Read more

Remote work

The remote workplace has become common throughout all industries, and as such, presents new challenges for cybersecurity professionals and new opportunities for bad actors. Moving a workforce to a remote work scenario requires that current security policies be adjusted to consider remote work-specific attack vectors and associated vulnerabilities. Create a 10- to 12-slide digital presentation … Read more

cyber security

   · What types of critical systems, networks, and data constitute your organization’s information infrastructure? Provide a brief description of these types of assets, and where relevant, the roles that these assets play in the organization.  · Which of these critical assets are the most essential to your organization’s ability to accomplish its mission? Explain … Read more

Answer the question

The AICPA’s Common Criteria list 9 categories to evaluate the Security Trust Service Criteria.  Briefly review the attached material on the Common Criteria and use it to perform a quick evaluation of your security breach that you have chosen for your research. Research topic is: corporate security breach for analysis is the State of California … Read more

Discussion board

 Draw parallels between cyber operations components in defense sector and another section (e.g. finance, health, etc.). Argue why cyber operations should not be allowed in non-military sectors.