• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • Week 01: Introduction
    • Week 02: Security and Risk Management
    • Week 03: Asset Security
    • Week 04: Security Engineering
    • Week 05: Communication and Network Security
    • Week 06: Identity and Access Management
    • Week 07: Security Assessment and Testing
    • Week 08: Security Operations
    • Week 9: Software Development Security

Cyber Security Capstone

Temple University

Paul Smith

Week 7: In the News – Security Assessments

June 23, 2020 by Paul Smith Leave a Comment

For this week’s “In the News”, perform research on one of the following:

  • new testing requirements (e.g. SSAE18 SOC1 or SOC2)
  • new testing requriements put into place due to regulations
  • how security assessments and testing integrates with other domains, such as cloud network architecture, or software development lifecycle?

Week 7: Security Assessments

June 23, 2020 by Paul Smith Leave a Comment

As you read about security assessments, what can you conclude from this week’s readings about:

  • How often security assessments should be performed?
  • Are there factors that would decide how often you would perform these assessments?
  • Conditions that might alter that schedule?
  • What security assessments are most essential?

Week 6: In the News – Compromised Identities, Improper Use of Access

June 15, 2020 by Paul Smith Leave a Comment

For this week’s “In the News”, research an article that centers around how identities were compromised to provide access, or how an account that was otherwise authorized was then used for unauthorized purposes.

Week 6: Identity & Access Management

June 15, 2020 by Paul Smith Leave a Comment

For this week’s Discussion, consider that you want senior management to support a new Access Management program at your organization. While this may involve technology-based solutions, your budget may be limited and it is therefore essential that senior management provide support and encourage efficient use of the resources that the organization already has.

  • Why is access management critical to today’s enterprise?
  • What benefits does an enterprise gain from proper access management?

Week 5: In the News – New Developments in Communications and Network Security

June 8, 2020 by Paul Smith Leave a Comment

For this week’s “In the News”, research a new technology solution, or new method to utilize a previous technology, to address Communications and Network Security. How does this solution or application revolutionize networks? If this is particular to certain industries, please also include that detail.

Week 5: Communications and Network Security

June 8, 2020 by Paul Smith Leave a Comment

When designing a network for an organization, what are the key considerations that should be factored into the design?  Why do you recommend those considerations?  Also consider how you would address the inevitable situation of scarce resources; how would you prioritize?

Week 4: In the News – Enterprise Architecture

June 2, 2020 by Paul Smith Leave a Comment

For this week’s “In the News”, research and article that discusses today’s approach to Enterprise Architecture. Specifically, how has a recent organization modified their architecture to meet an acquisition, divesture, or change in business?

Week 04: Enterprise Architecture

June 1, 2020 by Paul Smith Leave a Comment

When designing an architecture for an organization, how do organizations best meet the needs to define reasonable permissions?

As a security practitioner, what measures would you implement to ensure that staff can perform their job duties, but minimize the risk of unauthorized use or disclosure?

 

Week 3: In the News – Protecting Privacy

May 26, 2020 by Paul Smith Leave a Comment

During this week, research a recent law concerning privacy. Summarize this recent law for us:

  • What information does it protect,
  • What controls or limitations does the law specify,
  • What organizations need to comply with the law, and
  • In which regions would we need to be concerned with this law?

How does this law represent new risk(s) to the organization?

 

Week 3: DQ – Protecting Privacy

May 26, 2020 by Paul Smith Leave a Comment

In Domain #2, we discuss Asset Security, and following on Domain #1, recall that Data (or Information) is an organization’s key asset, and that the asset may exist in various forms – not just paper, but those digital assets. Also recall that there are several factors that should be included when determining the true cost or value of the asset to the organization.

How would Data Classification and Data Retention policy help an organization protect the privacy of the customers, as well as maintain the security of the organization’s information?

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 01: Introduction (1)
  • Week 02: Security and Risk Management (2)
  • Week 03: Asset Security (2)
  • Week 04: Security Engineering (2)
  • Week 05: Communication and Network Security (3)
  • Week 06: Identity and Access Management (1)
  • Week 07: Security Assessment and Testing (2)
  • Week 08: Security Operations (2)
  • Week 09: Software Development Security (2)
  • Week 10: New Trends (2)
  • Week 11: Incident Response (3)
  • Week 12: IT Security (2)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in