Important Information

You will get your content on your Email within 2 hours after successful payment.Kindly Email us for any query at uoptut@gmail.com or admin@uoptut.com

  • CMGT 230 ENTIRE COURSE (2018)

CMGT 230   ENTIRE COURSE (2018)


 
 
WEEK  1


 
CMGT 230 Week 1 Individual Assignment Individual: Access Controls

 


Instructions:

You have been hired to consult on access controls for a public health

care provider, which provides medical services to a surrounding lowerto

lower-middle-class community.

Information about clients of this health care provider include Personally

Identifiable Information (PII) and Protected Health Information (PHI),

which is governed by the federal Health Insurance Portability and

Accountability Act (HIPAA) regulation.

Write a 1- to 2-page briefing paper addressed to the executives at the

heath care provider that makes recommendations of at least one of the

access control models, covering the following access control elements:

  • Physical access controls that should be in place
  • Logical access controls for protection of Data at Rest (DAR)
  • Logical access controls for protection of Data in Motion (DIM)

Submit your report using the Assignment Files tab.

 

 

WEEK 2 


CMGT 230   Week 2 Individual Assignment Individual: Protecting Against Threats

 

Instructions:

As part of a consulting agreement for a private financial services

company with approximately 300 endpoints, as described in Ch. 3 of

SSCP (ISC)2 Systems Security Certified Practitioner Official Study

Guide. You are tasked with providing analysis of the most common

malicious code and activity to which the company is exposed.

Create a 10- to 12-slide PowerPoint® presentation with presenter notes

of a plan to company leadership detailing how to help protect the

company from the analyzed threats, including:

  • Network threats
  • Website vulnerabilities
  • Desktop controls

In your presentation, include policy recommendations to confront

threats.

 

CMGT 230   Week 2 Individual Assignment  Individual: Malicious Code

 

Instructions:

You work for a financial banking firm. There has been an increase in

attempts to spread malicious code on company computers.

Write a 1- to 1.5-page Frequently Asked Questions (FAQ) document

explaining to management what the characteristics of malicious code

activity look like and what activities should be monitored to protect

information and data.

 

 

 

WEEK 3


 
CMGT 230   Week 3 Individual Assignment Individual: Risk Assessment

 

 

Instructions:

As part of a consulting agreement for a public university that offers a

significant number of online programs, you are tasked with producing a

risk assessment report on the particular risks faced by the university

and identify ways to address potential incidents.

Research Risk Assessments.

Create a 1-page matrix organized as a table with the following column

headings: Risk Description; Affected divisions or functions; Impact

(High=5, Medium=3, Low=1); Rank of concern based on probability and

severity; Mitigation Strategy.List at least five risks in your matrix.

 

CMGT 230   Week 3 Individual Assignment Individual: Business Continuity and Disaster Recovery

 

Instructions:

The public university that has hired you as a security consultant does

not have in place effective means to handle incidents associated with

risks and does not have an effective plan in place for business

continuity or disaster recovery.

Create a 14- to 16-slide PowerPoint® presentation with presentation

notes to members of the university executive team addressing the

following areas:

  • Elements involved in effective handling of security incidents
  • Rationale for a Business Continuity Plan, what the plan and its

components are

  • Rationale for a Disaster Recovery Plan, what the plan and its

components are

Submit your presentation using the Assignment Files tab.

 

 

WEEK 4


 
CMGT 230  Week 4 Individual Assignment Individual: Networking Concepts

 

 
Instructions:

You have been hired by a public library to consult on improving

security, focusing on network security in the public facilities it manages.

Create a 1- to 2-page reference document that lists the basic

technology and concepts involved in networks so that management

might better understand what technology is used in networking and how

networks function.

Submit your assignment using the Assignment Files tab.

 

CMGT 230  Week 4 Individual Assignment  Individual: Networking and Wireless Security

 

Instructions:

As part of a consulting agreement for a public library system, you are

tasked with advising the organization on risks associated with both

wired and wireless networks in the public facilities managed by the

agency.

Write a 1- to 2-page briefing report with recommendations for the

agency. Detail the particular risks faced by exposing the network to

public access and the recommended actions or measures needed to

help decrease risks. Include the following key topics:

  • Physical network security
  • Logical network security, including encryption
  • Network firewall and ports/services to manage
  • Wireless networks for employees and guests
  • Activity monitoring on library computers used by the public

WEEK 5

 

CMGT 230 Week 5 Individual Assignment Individual: Malware Threats

 

Instructions:

Research common malware threats companies face today.

Using your company or this university as an example, create a 1/2- to

1-page matrix organized as follows:

  • Label the first column "Areas of Concern" and list three categories in

the first column:

  • Endpoints
  • Servers
  • Cloud-based applications
  • Label the second column "Threats" and list particular threats that are

associated with each area of concern

  • Label the third column "Threat Mitigation" and list steps organizations

can take to mitigate those threats to each area of concern

Submit your matrix using the Assignment Files tab

 

 

CMGT 230 Week 5 Individual Assignment Individual: Security for Cloud Computing and Endpoints

 

Instructions:

As part of a consulting agreement for a major package shipping and

delivery company, you are tasked with advising the company on

security. The company uses a cloud computing environment for

processing orders and maintaining all company records concerning

vendors and customers. In addition, the company utilizes internetbased

applications to communicate over mobile devices with its delivery

drivers in the field. Support personnel in the office use desktop

computers with typical peripheral devices.

Write a 2- to 3-page report for the company detailing the particular risks

to its computing resources, including the benefits and risks of using

Internet-based applications and communications for the delivery

drivers, as well as common threats facing computers and servers used

by support personnel in the office.

Write a review

Note: HTML is not translated!
    Bad           Good

CMGT 230 ENTIRE COURSE (2018)

  • Product Code: 270
  • Availability: In Stock
  • $50.00


Tags: CMGT 230 ENTIRE COURSE (2018)