CYB_200_Project_One_Jamie_Harrell
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
200
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
4
Uploaded by DrCrownZebra9
Harrell 1
Jamie Harrell
Southern New Hampshire University
CYB 200
Patricia Austin
October 6, 2022
Harrell 2
When looking into the human factor of security, there are a number of things to keep in mind.
One of those things is the speed at which information changes in the digital world. Because of
the fast pace of developments within the digital frontier we need to hold frequent security
awareness training sessions. The National Institute of Standards and Technology or NIST
recommends holding at least one annual security awareness training session. They also provide
some suggestions for the length of the sessions depending on the style in which the presentation
is presented. When considering the audience for our training sessions there are two categories in
which we can place the attendees of our sessions. General users and specialized or advanced
users. General users will be the bulk of the associates at Fizza Cola while advanced users would
be members of the security and IT teams. It is important we have those separate groups, so we
don’t overburden the general group with technical details not relevant to their jobs. When
identifying the materials needed to cover, we can split them up according to the group they will
be presented to. The general group needs to cover more basic security practices such as
protecting their physical area and equipment, protecting passwords, and how and when to report
a security incident. Examples include locking doors, proper storage and transporting of storage
devices such as flash drives, being mindful of tailgating, creating secure and easy to remember
passwords, never sharing passwords, what to do if they believe they have a virus, and how to
identify a phishing email. The more advanced users would cover all the general group covered
along with some additional topics. These include enforcing password policies, what to do if an
employee doesn’t have their ID badge, and how to implement different access controls. During
the training it is important to touch on the legal factors relating to cyber security and how as
associates of Fizza Cola they are handling Fizza Cola property in the form of data. They need to
be made aware of the legal aspects of not taking proper care of that data. Some additional things
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary.
You are working in organization X, and you are supposed to develop an issue-specific security policy
issue is MOBILE COMPUTING
Â
To develop the different sections of your policy, you can refer to SANS Policy Templates
https://www.sans.org/information-security-policy/
arrow_forward
4. College Security
Computer and online security is a growing concern for businesses of all sizes. Computer
security issues range from viruses to automated Internet attacks to outright theft, the result
of which is lost information and lost time. Security issues pop up in news articles daily, and
most business owners understand the need to secure their businesses. Your college is no
different from any other business when it comes to information security. Draft a document
identifying the questions you should ask your college's CIO to ensure information security
across your campus.
arrow_forward
Phishing attack simulation using Packet Tracer is a critical exercise in understanding and defending against cyber threats. In a minimum of two paragraphs, please reflect on your understanding of this topic. Share your insights into what phishing attacks are, how they are simulated using Packet Tracer, and the importance of this exercise in enhancing cybersecurity awareness and skills. Additionally, discuss any challenges or key takeaways you've gained from the simulation, and how this experience contributes to your knowledge of cybersecurity practices.
arrow_forward
Data Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?
arrow_forward
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:
Â
Discussion: Misadventures of a Nation State Podcast
Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.
Instructions:Â Â The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.
Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…
arrow_forward
What does "digital privacy" mean in the context of developing technology? Can you provide any examples of cyber security in detail?
arrow_forward
How does the Internet of Things (IoT) contribute to the evolution of information technology, and what are the associated security challenges?
arrow_forward
What does the term "digital privacy" mean in the context of technology's evolution? Can you provide concrete examples of cyber security?
arrow_forward
you will be writing an essay to discuss the evolution of hacking.
Your Essay should highlight the evolution of hacking from individuals to corporations (and their predominate locations) to cyber warfare. Include at least 5 different locations and events (more is better) to tell the story of how hacking has changed over time from the 1940's to present. Use your specific events to illustrate both when and what happened in each of these locations/events that changed the face of hacking as well as the global nature of hacking.
The events should be presented in time order. Also include images or figures, and any additional visual aids to help tell your story.
Where did the hack originate, who was the target if known, how did this event affect hacking as we know it, what was significant about this event. Your 5 or more locations should include at least 2 (preferably 3 or more) international locations as well as at least one United States location.
arrow_forward
Theft of one's identity is one of the most common forms of cybercrime, and each year it affects millions of individuals all over the world. Provide an explanation of how identity thieves obtain your personal information by using the internet, as well as the preventative measures you should take to avoid having your identity stolen by such criminals.
arrow_forward
You are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security. In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered. Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation. Â
Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM). In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software. During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number. You specified the Suspect was using IP Address 71.143.70.239:8451. Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms.
After coordinating with the university Office of Technology…
arrow_forward
The CAN-SPAM Act of 2003 was the first law meant to curtail unsolicited email, often referred to as spam. However, the law has many loopholes. Internet service providers (ISPs) and organizations' email administrators use antispam technologies as the front line guards against spam.
Â
Although spam still exists, do you think the CAN-SPAM Act has been effective? Why or why not?In what ways does spam affect digital forensic investigations?
arrow_forward
Question 11111Â
Computer Science
Write a strong password policy for an organization that is consistent with the best practices outlined in NIST (National Institute of Standards and Technology) 800-63B password guidelines.
arrow_forward
Security, cybercrime, privacy, social interaction, and governance are just few of the many areas that fall under the umbrella of computer ethics. How strongly do you believe that CIOs need to include computer ethics as a central tenet of their plan to safeguard private data?
arrow_forward
Security, cybercrime, privacy, social interaction, and governance are just few of the many areas that fall under the umbrella of computer ethics. How strongly do you believe that chief information officers (CIOs) should include computer ethics as a central tenet of their approach to safeguarding confidential data?
arrow_forward
In the digital age, computer security risks loom large, posing potential threats to our personal and professional lives. Engage in a discussion exploring the gravity of computer security risks and the measures individuals should take to protect their digital assets. How do you perceive the seriousness of these risks, and what steps do you believe are essential for safeguarding computer security in today's interconnected world?
Â
Please make sure i'm able to understand ur answer! Make sure it's organized.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305971776/9781305971776_smallCoverImage.gif)
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337097536/9781337097536_smallCoverImage.gif)
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337102063/9781337102063_smallCoverImage.gif)
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337405713/9781337405713_smallCoverImage.gif)
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305082168/9781305082168_smallCoverImage.gif)
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. You are working in organization X, and you are supposed to develop an issue-specific security policy issue is MOBILE COMPUTING  To develop the different sections of your policy, you can refer to SANS Policy Templates https://www.sans.org/information-security-policy/arrow_forward4. College Security Computer and online security is a growing concern for businesses of all sizes. Computer security issues range from viruses to automated Internet attacks to outright theft, the result of which is lost information and lost time. Security issues pop up in news articles daily, and most business owners understand the need to secure their businesses. Your college is no different from any other business when it comes to information security. Draft a document identifying the questions you should ask your college's CIO to ensure information security across your campus.arrow_forwardPhishing attack simulation using Packet Tracer is a critical exercise in understanding and defending against cyber threats. In a minimum of two paragraphs, please reflect on your understanding of this topic. Share your insights into what phishing attacks are, how they are simulated using Packet Tracer, and the importance of this exercise in enhancing cybersecurity awareness and skills. Additionally, discuss any challenges or key takeaways you've gained from the simulation, and how this experience contributes to your knowledge of cybersecurity practices.arrow_forward
- Data Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?arrow_forwardHi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:  Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions:  The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…arrow_forwardWhat does "digital privacy" mean in the context of developing technology? Can you provide any examples of cyber security in detail?arrow_forward
- How does the Internet of Things (IoT) contribute to the evolution of information technology, and what are the associated security challenges?arrow_forwardWhat does the term "digital privacy" mean in the context of technology's evolution? Can you provide concrete examples of cyber security?arrow_forwardyou will be writing an essay to discuss the evolution of hacking. Your Essay should highlight the evolution of hacking from individuals to corporations (and their predominate locations) to cyber warfare. Include at least 5 different locations and events (more is better) to tell the story of how hacking has changed over time from the 1940's to present. Use your specific events to illustrate both when and what happened in each of these locations/events that changed the face of hacking as well as the global nature of hacking. The events should be presented in time order. Also include images or figures, and any additional visual aids to help tell your story. Where did the hack originate, who was the target if known, how did this event affect hacking as we know it, what was significant about this event. Your 5 or more locations should include at least 2 (preferably 3 or more) international locations as well as at least one United States location.arrow_forward
- Theft of one's identity is one of the most common forms of cybercrime, and each year it affects millions of individuals all over the world. Provide an explanation of how identity thieves obtain your personal information by using the internet, as well as the preventative measures you should take to avoid having your identity stolen by such criminals.arrow_forwardYou are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security. In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered. Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation.  Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM). In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software. During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number. You specified the Suspect was using IP Address 71.143.70.239:8451. Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms. After coordinating with the university Office of Technology…arrow_forwardThe CAN-SPAM Act of 2003 was the first law meant to curtail unsolicited email, often referred to as spam. However, the law has many loopholes. Internet service providers (ISPs) and organizations' email administrators use antispam technologies as the front line guards against spam.  Although spam still exists, do you think the CAN-SPAM Act has been effective? Why or why not?In what ways does spam affect digital forensic investigations?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305971776/9781305971776_smallCoverImage.gif)
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337097536/9781337097536_smallCoverImage.gif)
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337102063/9781337102063_smallCoverImage.gif)
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337405713/9781337405713_smallCoverImage.gif)
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305082168/9781305082168_smallCoverImage.gif)
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning