Paul Smith wrote a new post, Week 12: In the News – Security Threats & Mitigation, on the site Cyber Security Capstone 2 months, 3 weeks ago
For this week’s “In the News”, locate an article that discusses one of the following:
new security threats
changing security threats
reduced security threats?
In regards to the threats that you have […]
During this last week of Discussion Questions, I would ask that you reflect that you consider at least one of the following:
Which security threats did you become aware of during this capstone class? How […]
Answer at least one of the following questions:
You’ve been hired as a consultant by an organization not due to a breach, but because their regulator documented a finding that the organization must redefine […]
For this week’s “In the News”, research a recent article, providing the link to the article, that describes an incident that impacted an organization.
How was the impact worse or reduced because of their […]
Paul Smith wrote a new post, Week 10: In the News – Success or Impact of New Trends, on the site Cyber Security Capstone 3 months, 1 week ago
For this week’s In the News, research an article how an organization has improved their productivity, efficiency, or quality of their key business services by adopting one of the New Trends in Information Security.
This week, choose one of the following new trends, and relate what the business implications (benefit, risk, threat) of the new trend. If this is a risk or threat to the organization, why does the organization […]
For this week’s “In the News”, research an article dealing with how secure code development practices (or lack thereof) affected a major software project; was the project more or less successful as a result?
For this week’s Discussion, we consider Application (Software) Development. Answer at least one of the following questions:
During which phase should Information Security be included? How would you explain to […]
Paul Smith wrote a new post, Week 8: In the News – Business Continuity & Disaster Recovery, on the site Cyber Security Capstone 3 months, 3 weeks ago
For this week’s “In the News”, research a recent article that relates how an organization was benefitted by their business continuity program, or suffered due to the lack of an adequate program? What are the key […]
Answer one of the following questions:
Considering that business continuity does not support day-to-day operations until a crisis situation, how does one justify the design, implementation, maintenance, and […]
For this week’s “In the News”, perform research on one of the following:
new testing requirements (e.g. SSAE18 SOC1 or SOC2)
new testing requriements put into place due to regulations
how security […]
As you read about security assessments, what can you conclude from this week’s readings about:
How often security assessments should be performed?
Are there factors that would decide how often you would […]
Paul Smith wrote a new post, Week 6: In the News – Compromised Identities, Improper Use of Access, on the site Cyber Security Capstone 4 months, 1 week ago
For this week’s “In the News”, research an article that centers around how identities were compromised to provide access, or how an account that was otherwise authorized was then used for unauthorized purposes.
For this week’s Discussion, consider that you want senior management to support a new Access Management program at your organization. While this may involve technology-based solutions, your budget may be limited […]
Paul Smith wrote a new post, Week 5: In the News – New Developments in Communications and Network Security, on the site Cyber Security Capstone 4 months, 2 weeks ago
For this week’s “In the News”, research a new technology solution, or new method to utilize a previous technology, to address Communications and Network Security. How does this solution or application […]
When designing a network for an organization, what are the key considerations that should be factored into the design? Why do you recommend those considerations? Also consider how you would address the i […]
For this week’s “In the News”, research and article that discusses today’s approach to Enterprise Architecture. Specifically, how has a recent organization modified their architecture to meet an acquisition, […]
When designing an architecture for an organization, how do organizations best meet the needs to define reasonable permissions?
As a security practitioner, what measures would you implement to ensure that staff […]
During this week, research a recent law concerning privacy. Summarize this recent law for us:
What information does it protect,
What controls or limitations does the law specify,
What organizations need […]
In Domain #2, we discuss Asset Security, and following on Domain #1, recall that Data (or Information) is an organization’s key asset, and that the asset may exist in various forms – not just paper, but those […]
- Load More