You are on page 1of 7

CYB 120 All Discussion

For more course tutorials visit

www.tutorialrank.com

CYB 120 Week 1 Discussion Computer Network Defense (CND)

CYB 120 Week 2 Discussion Who is More Harmful?

CYB 120 Week 3 Discussion Network Attack

CYB 120 Week 4 Discussion Security Controls

CYB 120 Week 5 Discussion Security Education, Training, and


Awareness Differences
.....................................................................................................................
.........................................

CYB 120 Week 1 Discussion Computer Network Defense


(CND)
For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Research Computer Network Defense (CND) and host-based


protections.
Compare each discussing two similarities and two differences. Why are
both needed?

.....................................................................................................................
.........................................

CYB 120 Week 2 Discussion Who is More Harmful?


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:


Two major threats to an organization are the insider human threat and
the outsider human threat. Explain which of the two threats is more
dangerous to an organization.

.....................................................................................................................
.........................................

CYB 120 Week 3 Discussion Network Attack


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Research network attacks and the issues they cause.

Choose two attacks and compare their effectiveness at exploiting a


network.
.....................................................................................................................
.........................................

CYB 120 Week 4 Discussion Security Controls


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Research the SANS 20 Critical Security Controls.

Choose Control #13, Limitation and Control of Network Ports,


Protocols, and Services.

Discuss the relationship between security controls and risk. What is the


importance of specifying priority and sequence?
.............................................................................................
.................................................................

CYB 120 Week 4 Individual Controls, Protocols, and


Threats Presentation and Analysis
For more course tutorials visit

www.tutorialrank.com

CYB 120 Week 4 Individual Controls, Protocols, and Threats

You are in charge of cybersecurity for a major online sales company. It


is imperative that you have the most effective cybersecurityavailable,
Resolution after an attack has occurred is not a viable solution. You need
to make sure an attack never occurs.

Create an 8- to 10-slide multimedia rich PowerPoint® presentation,


including interactive diagrams, media, or videos, displaying the most
common controls, protocols, and associated threats to your business.
Include the following in your presentation:

What do they protect against?

What is their purpose?


Write a 1- to 2-page analysis of your findings answering the following
questions.

How are they implemented to defend against attacks and to limit risk?
What significance do the OSI, TCP/IP, and SANS 20 Controls play in
network protection?

What controls and protocols would you find in a security policy?

Submit your assignment using the Assignment Files tab.

.....................................................................................................................
.........................................

CYB 120 Week 5 Discussion Security Education,


Training, and Awareness Differences
For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:


Education, training, and awareness are an essential element in ensuring
effectiveness of security policies. However, although education, training,
and awareness achieve common security goals, there are differences
between them.

Describe the differences between education, training, and awareness and


how they are relevant to an organization.

You might also like