Category: Cyber Security

  • Module 4: Critical Thinking

    Analyzing and Comparing Cybersecurity Risk Management Approaches in Business

    This assignment challenges you to critically examine different risk management approaches-such as qualitative, quantitative, and scenario-based-and compare their effectiveness, practicality, and impact within a real or hypothetical business context.

    Instructions

    1. Select a Business Context
    • Choose a real company (e.g., a Saudi bank, healthcare provider, or e-commerce firm other than Saudi Aramco) or create a hypothetical organization. Briefly describe its core business, digital assets, and key cybersecurity concerns.
    1. Identify and Assess Risks
    • List at least three significant cybersecurity risks relevant to your chosen business.
    • For each risk, perform a qualitative assessment (e.g., high/medium/low impact and likelihood) and a quantitative assessment (e.g., estimate potential financial loss using available data or reasonable assumptions).
    1. Compare Risk Management Approaches
    • Analyze how qualitative, quantitative, and scenario-based risk assessments would influence the organizations decision-making and prioritization of controls.
    • Discuss the advantages and limitations of each approach in your selected context (e.g., speed, accuracy, data requirements, business relevance).
    1. Apply Risk Treatment Strategies
    • For each risk, recommend a treatment strategy (avoidance, mitigation, transference, or acceptance) and justify your choice based on business objectives, risk appetite, and resource constraints.
    • Consider how continuous feedback and monitoring would affect

    This assignment will help you develop the analytical and evaluative skills essential for effective cybersecurity risk management in real-world business environments.

    Provide information from your readings to support your statements.

    Your well-written paper should meet the following requirements:

    • Four to five pages, not including the title and reference pages.
    • You should include two external references in addition to the textbook.
    • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, citing references as appropriate.
    • You are strongly encouraged to submit all assignments to the Turnitin Originality Check before submitting them to your instructor for grading. If you are unsure how to submit an assignment to the originality check tool, review the Turnitin Originality Check Student Guide.
  • Module 4: Critical Thinking

    Analyzing and Comparing Cybersecurity Risk Management Approaches in Business

    This assignment challenges you to critically examine different risk management approaches-such as qualitative, quantitative, and scenario-based-and compare their effectiveness, practicality, and impact within a real or hypothetical business context.

    Instructions

    1. Select a Business Context
    • Choose a real company (e.g., a Saudi bank, healthcare provider, or e-commerce firm other than Saudi Aramco) or create a hypothetical organization. Briefly describe its core business, digital assets, and key cybersecurity concerns.
    1. Identify and Assess Risks
    • List at least three significant cybersecurity risks relevant to your chosen business.
    • For each risk, perform a qualitative assessment (e.g., high/medium/low impact and likelihood) and a quantitative assessment (e.g., estimate potential financial loss using available data or reasonable assumptions).
    1. Compare Risk Management Approaches
    • Analyze how qualitative, quantitative, and scenario-based risk assessments would influence the organizations decision-making and prioritization of controls.
    • Discuss the advantages and limitations of each approach in your selected context (e.g., speed, accuracy, data requirements, business relevance).
    1. Apply Risk Treatment Strategies
    • For each risk, recommend a treatment strategy (avoidance, mitigation, transference, or acceptance) and justify your choice based on business objectives, risk appetite, and resource constraints.
    • Consider how continuous feedback and monitoring would affect

    This assignment will help you develop the analytical and evaluative skills essential for effective cybersecurity risk management in real-world business environments.

    Provide information from your readings to support your statements.

    Your well-written paper should meet the following requirements:

    • Four to five pages, not including the title and reference pages.
    • You should include two external references in addition to the textbook.
    • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, citing references as appropriate.
    • You are strongly encouraged to submit all assignments to the Turnitin Originality Check before submitting them to your instructor for grading. If you are unsure how to submit an assignment to the originality check tool, review the Turnitin Originality Check Student Guide.
  • Survey of Log Files Report

    Continue your work for a cybersecurity company that offers a full range of forensic tools and services. As part of an ongoing marketing effort toward forensic investigators, the company is publishing a series of short articles that will be posted to LinkedIn and other social media sites. This will be the second of 2 LinkedIn posts related to log files (the first one you wrote in Week 1).

    In an effort to educate the companys customers and show off their expertise, write a 2- to 3- page article comparing the use of log files in network forensics, database forensics, and cloud forensics. Complete the following in the article:

    • Describe the importance of log files in network forensics, database forensics, and cloud forensics.
    • List the most important and common log files used in network forensics, database forensics, and cloud forensics.
    • Describe the process and difficulty in acquiring the log files in network forensics, database forensics, and cloud forensics.
    • Discuss software that can be used to acquire and analyze log files.
    • Research and discuss the possibility of log files being changed or not containing the pertinent information in network forensics, database forensics, and cloud forensics.

    You will need to do additional research to complete this report. Be sure to properly cite your sources using APA formatting.

  • How to Set Up SSH in Virtual Box

    1. Inside the VM (Guest)

    Make sure the SSH service is installed and active:

    Install: sudo apt install openssh-server

    Check Status: sudo systemctl status ssh

    2. In VirtualBox Settings (Host)

    Go to your VM Settings > Network > Advanced > Port Forwarding, then add a new rule:

    Name: SSH

    Protocol: TCP

    Host IP: 127.0.0.1

    Host Port: 2222

    Guest Port: 22 (Leave the Guest IP blank).

    3. How to Access

    Open Terminal/PowerShell on the main PC (Host), then type:

    Bash

    ssh -p 2222 username_vm@127.0.0.1

  • cyb 320 journal entry #2

    Explain why an Incident Response Plan (IRP) is critical to organizations. What are the critical elements? Why could an organization fail at incident response?

    First, complete the assigned readings for the week. Then read the journal prompt and write a reflection. Your journal entry should be two paragraphs long and address the prompt provided in each module.

    In your response, be certain to address the following critical elements:

    1. Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
    2. Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
    3. Voice: Write in a style that is appealing and appropriate for the intended audience and use a consistent voice that is evident throughout.
  • Cyber Security Question

    MEMO
    Urgent Research for customer: Off The Record Music Services

    From: Sam
    To: You the consultant as an individual

    Re: Impact of European Union General Data Protection Regulation (GDPR) on Off The Record Music Services (OTR)

    Consultant,
    One of our customer has contacted us and requested a review and analysis of the impact of EU GDPR and our recommendations to ensure their proper compliance.

    As a reminder, OTR is a boutique music publisher and seller based in Chicago Lincoln Park. It has only one location which includes a retail shop, all operations, publishing and their IT servers that store all the customer information, orders, music and authors information.

    OTR does ship some of the records to customers located in the EU. OTR stores the customer information including names, email, shipping addresses.

    Some of the authors who publishes music using OTR are also located in the EU. OTR stores their information (including names, email, shipping addresses ) as well as their recording contracts and royalty payment agreements.

    OTR does not store any payment information on customers or author.

    Please review the requirement and write a short report (4-5 pages) that we can deliver to the customer addressing the regulation, its impact on the customer and your recommendations.

    Pay information:Consultants delivering their report will be given up to 4% pay Partial credits will be given for reports that

    may miss items.