You will get your content on your Email within 2 hours after successful payment.Kindly Email us for any query at firstname.lastname@example.org or email@example.com
CMGT 230 ENTIRE COURSE (2018)
CMGT 230 Week 1 Individual Assignment Individual: Access Controls
You have been hired to consult on access controls for a public health
care provider, which provides medical services to a surrounding lowerto
Information about clients of this health care provider include Personally
Identifiable Information (PII) and Protected Health Information (PHI),
which is governed by the federal Health Insurance Portability and
Accountability Act (HIPAA) regulation.
Write a 1- to 2-page briefing paper addressed to the executives at the
heath care provider that makes recommendations of at least one of the
access control models, covering the following access control elements:
- Physical access controls that should be in place
- Logical access controls for protection of Data at Rest (DAR)
- Logical access controls for protection of Data in Motion (DIM)
Submit your report using the Assignment Files tab.
CMGT 230 Week 2 Individual Assignment Individual: Protecting Against Threats
As part of a consulting agreement for a private financial services
company with approximately 300 endpoints, as described in Ch. 3 of
SSCP (ISC)2 Systems Security Certified Practitioner Official Study
Guide. You are tasked with providing analysis of the most common
malicious code and activity to which the company is exposed.
Create a 10- to 12-slide PowerPoint® presentation with presenter notes
of a plan to company leadership detailing how to help protect the
company from the analyzed threats, including:
- Network threats
- Website vulnerabilities
- Desktop controls
In your presentation, include policy recommendations to confront
CMGT 230 Week 2 Individual Assignment Individual: Malicious Code
You work for a financial banking firm. There has been an increase in
attempts to spread malicious code on company computers.
Write a 1- to 1.5-page Frequently Asked Questions (FAQ) document
explaining to management what the characteristics of malicious code
activity look like and what activities should be monitored to protect
information and data.
CMGT 230 Week 3 Individual Assignment Individual: Risk Assessment
As part of a consulting agreement for a public university that offers a
significant number of online programs, you are tasked with producing a
risk assessment report on the particular risks faced by the university
and identify ways to address potential incidents.
Research Risk Assessments.
Create a 1-page matrix organized as a table with the following column
headings: Risk Description; Affected divisions or functions; Impact
(High=5, Medium=3, Low=1); Rank of concern based on probability and
severity; Mitigation Strategy.List at least five risks in your matrix.
CMGT 230 Week 3 Individual Assignment Individual: Business Continuity and Disaster Recovery
The public university that has hired you as a security consultant does
not have in place effective means to handle incidents associated with
risks and does not have an effective plan in place for business
continuity or disaster recovery.
Create a 14- to 16-slide PowerPoint® presentation with presentation
notes to members of the university executive team addressing the
- Elements involved in effective handling of security incidents
- Rationale for a Business Continuity Plan, what the plan and its
- Rationale for a Disaster Recovery Plan, what the plan and its
Submit your presentation using the Assignment Files tab.
CMGT 230 Week 4 Individual Assignment Individual: Networking Concepts
You have been hired by a public library to consult on improving
security, focusing on network security in the public facilities it manages.
Create a 1- to 2-page reference document that lists the basic
technology and concepts involved in networks so that management
might better understand what technology is used in networking and how
Submit your assignment using the Assignment Files tab.
CMGT 230 Week 4 Individual Assignment Individual: Networking and Wireless Security
As part of a consulting agreement for a public library system, you are
tasked with advising the organization on risks associated with both
wired and wireless networks in the public facilities managed by the
Write a 1- to 2-page briefing report with recommendations for the
agency. Detail the particular risks faced by exposing the network to
public access and the recommended actions or measures needed to
help decrease risks. Include the following key topics:
- Physical network security
- Logical network security, including encryption
- Network firewall and ports/services to manage
- Wireless networks for employees and guests
- Activity monitoring on library computers used by the public
CMGT 230 Week 5 Individual Assignment Individual: Malware Threats
Research common malware threats companies face today.
Using your company or this university as an example, create a 1/2- to
1-page matrix organized as follows:
- Label the first column "Areas of Concern" and list three categories in
the first column:
- Cloud-based applications
- Label the second column "Threats" and list particular threats that are
associated with each area of concern
- Label the third column "Threat Mitigation" and list steps organizations
can take to mitigate those threats to each area of concern
Submit your matrix using the Assignment Files tab
CMGT 230 Week 5 Individual Assignment Individual: Security for Cloud Computing and Endpoints
As part of a consulting agreement for a major package shipping and
delivery company, you are tasked with advising the company on
security. The company uses a cloud computing environment for
processing orders and maintaining all company records concerning
vendors and customers. In addition, the company utilizes internetbased
applications to communicate over mobile devices with its delivery
drivers in the field. Support personnel in the office use desktop
computers with typical peripheral devices.
Write a 2- to 3-page report for the company detailing the particular risks
to its computing resources, including the benefits and risks of using
Internet-based applications and communications for the delivery
drivers, as well as common threats facing computers and servers used
by support personnel in the office.
CMGT 230 ENTIRE COURSE (2018)
- Product Code: 270
- Availability: In Stock