Call us

network security

Course Textbook(s)

Kim, D., & Solomon, M. G. (2018). Fundamentals of information systems security (3rd ed.). Burlington, MA: Jones & Bartlett Learning.

 

 

 

 

 

 

Unit Assignments

Unit I PowerPoint Presentation

Consider the following scenario:

You are a security specialist and have been asked to provide a presentation to the CSU Medical Center. Your audience consists of medical receptionists, doctors, and finance personnel. Summarize the concepts of the threat triad and C-I-A triad on how patient information is handled by the different jobs within the medical facility. Hint: Does the receptionist need billing information, or the finance department need patient prognosis, or do doctors need patient addresses? Explain who needs what information and how C-I-A helps protect that information.

Your completed PowerPoint presentation should be 8 to 10 slides in length. This does not include your title and reference slides. Use bullet points for your text, add additional information in your notes section of the slides, and include a minimum of four graphics or pictures.

Include at least two sources in your assignment. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines. Make sure you format your presentation according to APA style.

Unit II Scholarly Activity

Consider the following scenario:

The security manager of your organization has approached you to explain the new threat of ransomware to the organization.

Compose a document in which you explain this threat. This scholarly activity has three parts:

1. Explain the definition of ransomware.

2. Summarize the WannaCry threat.

3. Which risk register would you use to identify WannaCry?

Your assignment should be a minimum of two pages in length, double-spaced. You must utilize at least one outside source. Use your own words, and include citations and references as needed to avoid plagiarism. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines.

Information about accessing the grading rubric for this assignment is provided below.

Unit III Project

Consider the following scenario:

XYZ Corporation is a small Internet service provider (ISP) company consisting of two multipurpose servers and 25 networked workstations. All the employees in the corporation have Internet access and use e-mail. About five employees use laptops out in the field. There are 32 employees in the company consisting of the CEO, systems administrator, IT personnel, help desk, finance personnel, and field representatives.

With the information provided above, determine who has what levels of authorization (Remember there are three levels of authorization). Correctly assign the levels of authorization to the employees. Also, describe the different identification methods that the organization should use to correctly identify the employees. Below, additional information is provided.

The 25 networked workstations and other systems are assigned as follows:

· CEO and system administrator—1 workstation each,

· help desk department—13 workstations,

· finance department—5 workstations,

· IT department—5 workstations,

· field representatives—5 laptops, and

· computer room—2 servers.

Your project should be a minimum of two pages in length, double-spaced. You must utilize at least one scholarly source. Use your own words, and include citations and references as needed to avoid plagiarism. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines.

Information about accessing the grading rubric for this assignment is provided below.

Unit IV Scholarly Activity

Write a brief disaster recovery plan for your home. Include assets such as home or dwelling, transportation, utilities, food, finance, and family. Thinking of your home as a business, how would you recover from a disruption or disaster? What steps would be necessary to restore normal operations in your home? Outline specific steps you would need to take in key areas.

Your assignment should be a minimum of two pages in length, double-spaced. You must utilize at least one outside source. Use your own words, and include citations and references as needed to avoid plagiarism. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines.

Information about accessing the grading rubric for this assignment is provided below.

Unit V PowerPoint Presentation

Consider the following scenario:

The senior systems analyst has tasked you to conduct a briefing on the different types of firewalls. In this briefing, you must show a diagram of where on the LAN the firewalls are placed on the network.

Utilize the following guidelines to create your PowerPoint presentation:

· One slide will consist of a LAN diagram of the location of a firewall.

· The other three slides should describe the types of firewalls.

· Utilize the Notes section of the slides to explain phases and additional information (this is required).

Your completed PowerPoint presentation should be six slides in length, which includes your title and reference slides. You should present your text in bulleted lists and add additional information in your notes section of the slides. Include at least two sources in your assignment. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines. Make sure you format your presentation according to APA style..

Information about accessing the grading rubric for this assignment is provided below.

Unit VI Project

Antivirus Software, Malware Removal, and Internet Security

There are many types of vendor software programs available for antivirus, malware, and Internet security, including open source, freely downloadable, and commercially available off-the-shelf software applications. You should be familiar with as many of these software applications as possible to determine what is needed to protect and monitor against attacks and intrusions and to mitigate the vulnerabilities.

Compile a list, and describe at least 10 of the most widely used antivirus software, malware removal, and Internet security applications. Clearly provide a description of each application, how many devices it may be installed on, and what operating systems can be protected by the application. Include the benefits of each application and any vulnerabilities it may have.

Number your list of applications, and for each entry, provide the name and website location. Provide a conclusion and describe which of the applications you think is the best for your computer system.

Your project should be a minimum of two pages in length, double-spaced. Information about accessing the grading rubric for this assignment is provided below.

Unit VII Reflection Paper

You have read about the different certification and degree programs. Using a variety of sources, carefully select which degrees and/or certifications you think would best qualify you to become a successful security specialist. Map out the progression of these certifications and degrees, giving a description of the programs and how you would go about completing each one. Your task is to provide the following:

1. Give a description of the certification or degree program.

2. List the cost of the certification or degree (semester hour).

3. Describe how often you need to re-certify, and describe if there are any CEUs you must complete after testing for your certification.

4. Explain why you selected each certification or degree program.

You must have a minimum of two references, Make sure your paper is formatted using APA style. Use your own words, and include citations and references as needed to avoid plagiarism.

Information about accessing the grading rubric for this assignment is provided below.

Unit VIII PowerPoint Presentation

Consider this scenario:

You have been tasked by the security specialist at your organization to provide a presentation about information security standards and compliance.

Select one security standard and one compliance topic below for your presentation. Summarize the standard and the compliance topic, and use the information you have learned throughout this course to describe how each one affects your organization. Discuss how your organization implements measures to comply with standards and laws.

Select one standard:

· National Institute of Standards and Technology (NIST)

· International Organization for Standardization (ISO) 27002

· Payment Card Industry Data Security Standard (PCI DSS)

Select one compliance topic:

· Health Insurance Portability and Accountability Act (HIPAA)

· Sarbanes-Oxley Act (SOX)

· Family Educational Rights and Privacy Act (FERPA)

Your completed PowerPoint presentation should be a minimum of eight slides in length. This does not include your title and reference slides. Use bullet points for your text, add additional information in the notes section of your slides, and include a minimum of four graphics or pictures. Include at least two sources in your assignment. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines.

Both comments and pings are currently closed.

Comments are closed.

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes