You are on page 1of 6

CYB 205 All Discussion

For more course tutorials visit

www.tutorialrank.com

CYB 205 Week 1 Discussion Vulnerabilities

CYB 205 Week 2 Discussion Threats

CYB 205 Week 3 Discussion Cryptography

CYB 205 Week 4 Discussion Technical Controls

CYB 205 Week 5 Discussion Cloud-based Systems Support

.....................................................................................................................
.........................................

CYB 205 Week 1 Discussion Vulnerabilities


For more course tutorials visit

www.tutorialrank.com
Respond to the following in a minimum of 175 words:

Vulnerabilities can exist in both a business' software and hardware.

Discuss the differences between software and hardware vulnerabilities.


How might these vulnerabilities impact a business

.....................................................................................................................
.........................................

CYB 205 Week 2 Discussion Threats


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:


Today's datacenters are populated with not only physical hardware but
systems hosting virtual machines and containers. These systems
communicate locally and around the globe over networks.

Discuss two different examples of threats to various parts of


heterogeneous architectures and how they might manifest. Do not forget
about the hardware, operating systems, applications, networks, and other
integral parts. Discuss the threats in your classmates' posts.

.....................................................................................................................
.........................................

CYB 205 Week 3 Discussion Cryptography


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Cryptography has been around for millennia. Modern digital crypto


systems are more robust than ever before.
Explain cryptography. Discuss how a modern encryption system is used
to protect data and data use.
.....................................................................................................................
.........................................

CYB 205 Week 4 Discussion Technical Controls


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Controls are countermeasures used to treat risks. Within the categories


of administrative or technical controls, there can be preventative,
detective, and responsive types of controls.

Research a specific control, and discuss how it differs from the other


technical controls.

Example: An appropriate use policy could be an administrative


preventative control.
.............................................................................................
.................................................................
CYB 205 Week 5 Discussion Cloud-based Systems
Support
For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

Cloud-based systems and services are often ideal options for critical
parts of a Business Continuity (BC) or Disaster Recovery Plan (DRP).

Research some of the ways this is being done today.

Discuss how cloud-based systems support business continuity. How can


potential risks be transferred to cloud providers?

Note: This information can be applied to the Week Five Individual


Assignment, "Business Continuity and the Cloud."

You might also like