Tedext

General Overview of Cyber Security and Computer Security

Step 1: Review Assigned Organization


All four projects for this course will be completed from the vantage point of a specific industry and an organization assigned to you by the instructor. Familiarize yourself with the organization your instructor has assigned to you by reviewing the organization description. The descriptions include an overview and key information about the organization, as well as information about a breach or attempted breach. For the purposes of this course, you will assume this organization is your employer. You may wish to briefly research your assigned organization to gather additional information about the organization and its security posture.

Step 2: Cyber security Background Summary

In Step 1, you familiarized yourself with your assigned organization. Now it is time to write a cyber security overview. Write a three-page background summary that includes a general overview of cyber-security and a section on enterprise cyber security.
Please include the following items in your general overview of cyber security:
Compare and contrast cyber security and computer security.
Discuss Data flows across networks. (Review Bits and Bytes, Non-Textual Data, Evolution of Communication systems, Computer Networks, Network Devices & Cables and Network Protocols if you do not already have a working understanding of these topics.)
Discuss basic cyber security concepts and vulnerabilities, including flaws that can exist in software. (Review Systems Software, Application Software, Software Interaction and Programming if you do not already have a working understanding of these topics.)
Discuss common cyber security attacks. (Review A Closer Look at the Web and Web Markup Language if you do not already have a working understanding of these topics.)
Discuss penetration testing.
Discuss how to employ Network forensic analysis tools (NFAT) to identify software communications vulnerabilities.
Please include the following items in your enterprise cyber security section:
List and discuss the major concepts of enterprise cyber security.
Discuss the principles that underlie the development of an enterprise cyber security policy framework and implementation plan.
List the major types of cyber security threats that a modern enterprise might face.
You will attach this cyber security background summary to your security assessment in Step 5.
Submit the cyber security background summary for feedback.

General Overview of Cyber Security and Computer Security

  • Order

  • Payment

  • Processing

  • Delivery

Validation error occured. Please enter the fields and submit it again.
Thank You ! Your email has been delivered.