Category: Cybersecurity

  • Technology Evaluation Criteria

    Scenario

    Your instructor will provide you with the scenario for this project in an announcement. The scenario will provide you with the beginning of a security plan that documents areas relevant to your decision making for the project.

    Additionally, a fellow analyst is completing an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. You will be provided with the completed evaluation matrix in Module Seven for use in completing Project Three. Your manager has also provided a list of questions that they would use to evaluate the organizational needs in an IDS or IPS.

    You will find the technology evaluation criteria and your managers questions in the Technology Evaluation Criteria document, which can be found in the Project Three Milestone task in Module Five of your course. For your submission, you will download and fill out the Technology Evaluation Criteria Worksheet, linked in the What to Submit section below and in the Project Three Milestone task in Module Five.

    Based on your analysis of the technology evaluation criteria, the details provided in the scenario, and your managers guiding questions, you will identify the highest priority criteria and select Fundamental Security Design Principles related to your prioritization.

    Prompt

    Submit a completed Technology Evaluation Criteria Worksheet, which includes a filled-out table, your prioritized list, and two Fundamental Security Design Principles that best encompass your list. You will also need to justify and explain your selections.

    Specifically, you must address the critical elements listed below.

    Complete the blank column in the technology evaluation criteria table in the provided worksheet. Use the managers questions and the evaluation criteria to identify relevant company profile information for 10-13 evaluation criteria from the organizational security plan material in the scenario.

    Based on your assessment of the relevant information from the organizational security plan, provide a prioritized list of the three most important evaluation criteria. Justify your rationale for determining the priority of your selected elements.

    Select two Fundamental Security Design Principles that best encompass the priority list. Explain the correlation between your priority list and the principles you identified.

    What to Submit

    Download, fill out, and submit the Technology Evaluation Criteria Worksheet, which includes the technology evaluation criteria table, your prioritized list, and your chosen Fundamental Security Design Principles.

    Attached Files (PDF/DOCX): scenario.pdf, Technology Evaluation Criteria.pdf, CYB 220 Module Five Technology Evaluation Criteria Worksheet.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Digital Forensic Investigation Exploration

    Prompt

    After reading the article, Iceman Pleads Guilty to Massive Computer Hacking, linked in the Module Five Reading and Resources section of your course, address the following critical elements:

    1. Case Study Analysis
    2. Identify at least two assets that are relevant for the investigation, and explain which areas of those assets should be searched for evidence.
    3. Based on the assets you identified, describe which digital forensic hardware and software tools you would need to use to collect evidence. Justify your selection.
    4. Explain the procedures you would use to maintain chain of custody for the collected evidence.
    5. Proactive Approaches
    6. Explain why a systems thinking mindset is important when performing these investigations.
    7. Explain why it is essential to maintain data integrity during a digital forensic investigation for both court cases and non-court cases.
    8. Explain the concept of chain of custody and why it is important for collected evidence.

    What to Submit

    Your submission should be 2 to 3 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your namefor example, CYB_123_Assignment_Firstname_Lastname.docx.

    Article: https://www.computerworld.com/article/1551500/iceman-pleads-guilty-to-massive-computer-hacking.html

    Attached Files (PDF/DOCX): Project Two Stepping Stone Guidelines and Rubric – CYB-320-12149-M01 Incident Response and Invest 2026 C-1 (Jan – Mar).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Project 2: Secure Microsoft 365 Access with Conditional Acce…

    the instructions will be posted in the attached file

    Attached Files (PDF/DOCX): CMIT 382 Project2 Template.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Risk Management and Types of Risk Management

    Unit 5 Discussion

    Risk Management and Types of Risk Management

    • What are the options when it comes to managing risk?
    • What are the factors that are considered when deciding what is the best approach to take?
    • What are the differences between qualitative and quantitative risk? Include examples of each.
    • What is the difference, and what factors are considered when choosing the best approach to take?

    Attached Files (PDF/DOCX): Unit 5 Discussion.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Assignment 2 Memo/ Flyer

    part 2 of the assignment. the directions are clear so follow them and use the rubric to reference on how the professor will grade the assignment. this is a 2 step assignment. create a memo (2-3 ) then create a flyer (1 page).

    Attached Files (PDF/DOCX): Unit 5 Assignment 2 Memo and Flyer Part 2 Rubric.pdf, Unit 5 Assignment 2 Part 2 Directions.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • 4A – Week 4 Assessment – Research and answer the following r…

    Whats the difference between sending a preservation order and a subpoena to online cloud provider such as Google?

    Clearly identify the difference and describe it in a 60 to 90 second video. You may use Instragram, TikTok, Facebook or any other video software or tool to create this video.

    Video Requirements

    • Video must be between 60 and 90 seconds long
    • You must show your face on video while you are speaking for at least 15 seconds.
    • You must speak the entire time. i.e. you can’t just include a bunch of slides, pictures, or videos or someone else talking.
    • You must clearly identify the difference
    • It must be in a format that can be uploaded here
    • I must be able to hear you and understand you while you are speaking in the video
    • Get as fancy and creative as you like. You can add features, text, graphics, etc., that are available in your video creation tool.

    BONUS: The most creative video will receive 10 extra credit points on this assignment.

  • 4A – Week 4 Assessment – Research and answer the following r…

    Whats the difference between sending a preservation order and a subpoena to online cloud provider such as Google?

    Clearly identify the difference and describe it in a 60 to 90 second video. You may use Instragram, TikTok, Facebook or any other video software or tool to create this video.

    Video Requirements

    • Video must be between 60 and 90 seconds long
    • You must show your face on video while you are speaking for at least 15 seconds.
    • You must speak the entire time. i.e. you can’t just include a bunch of slides, pictures, or videos or someone else talking.
    • You must clearly identify the difference
    • It must be in a format that can be uploaded here
    • I must be able to hear you and understand you while you are speaking in the video
    • Get as fancy and creative as you like. You can add features, text, graphics, etc., that are available in your video creation tool.

    BONUS: The most creative video will receive 10 extra credit points on this assignment.

  • InfoSec common body of knowledge (CBK)

    review the InfoSec common body of knowledge (CBK). &context=jdfsl When you review the list of 10 areas in the CBK, is policy listed? Why do you think this is so? Write 1 paragraph (4-6 sentences) on your findings. mla use citation page
  • Cybersecurity Readiness Tabletop Exercise

    Need work by deadline

    Attached Files (PDF/DOCX): Unit 5 Assignment Directions.docx, Senario.docx, CISA Tabletop Exercise Package.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Securing WANs: Strategies Against Evolving Threats

    Please look at screenshot for instructions:

    Attached is the link for reference to use: