-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 2 months ago
For this week’s “In the News”, locate an article that discusses one of the following:
new security threats
changing security threats
reduced security threats?In regards to the threats that you have […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 2 months ago
During this last week of Discussion Questions, I would ask that you reflect that you consider at least one of the following:
Which security threats did you become aware of during this capstone class? How […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 2 months ago
Answer at least one of the following questions:
You’ve been hired as a consultant by an organization not due to a breach, but because their regulator documented a finding that the organization must redefine […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 2 months ago
For this week’s “In the News”, research a recent article, providing the link to the article, that describes an incident that impacted an organization.
How was the impact worse or reduced because of their […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
For this week’s In the News, research an article how an organization has improved their productivity, efficiency, or quality of their key business services by adopting one of the New Trends in Information Security.
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
This week, choose one of the following new trends, and relate what the business implications (benefit, risk, threat) of the new trend. If this is a risk or threat to the organization, why does the organization […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
For this week’s “In the News”, research an article dealing with how secure code development practices (or lack thereof) affected a major software project; was the project more or less successful as a result?
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
For this week’s Discussion, we consider Application (Software) Development. Answer at least one of the following questions:
During which phase should Information Security be included? How would you explain to […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
For this week’s “In the News”, research a recent article that relates how an organization was benefitted by their business continuity program, or suffered due to the lack of an adequate program? What are the key […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
Answer one of the following questions:
Considering that business continuity does not support day-to-day operations until a crisis situation, how does one justify the design, implementation, maintenance, and […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
For this week’s “In the News”, perform research on one of the following:
new testing requirements (e.g. SSAE18 SOC1 or SOC2)
new testing requriements put into place due to regulations
how security […] -
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 3 months ago
As you read about security assessments, what can you conclude from this week’s readings about:
How often security assessments should be performed?
Are there factors that would decide how often you would […] -
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
For this week’s “In the News”, research an article that centers around how identities were compromised to provide access, or how an account that was otherwise authorized was then used for unauthorized purposes.
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
For this week’s Discussion, consider that you want senior management to support a new Access Management program at your organization. While this may involve technology-based solutions, your budget may be limited […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
For this week’s “In the News”, research a new technology solution, or new method to utilize a previous technology, to address Communications and Network Security. How does this solution or application […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
When designing a network for an organization, what are the key considerations that should be factored into the design? Why do you recommend those considerations? Also consider how you would address the i […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
For this week’s “In the News”, research and article that discusses today’s approach to Enterprise Architecture. Specifically, how has a recent organization modified their architecture to meet an acquisition, […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
When designing an architecture for an organization, how do organizations best meet the needs to define reasonable permissions?
As a security practitioner, what measures would you implement to ensure that staff […]
-
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
During this week, research a recent law concerning privacy. Summarize this recent law for us:
What information does it protect,
What controls or limitations does the law specify,
What organizations need […] -
Paul Smith wrote a new post on the site Cyber Security Capstone 4 years, 4 months ago
In Domain #2, we discuss Asset Security, and following on Domain #1, recall that Data (or Information) is an organization’s key asset, and that the asset may exist in various forms – not just paper, but those […]
- Load More