tutorbin

cyber security homework help

Boost your journey with 24/7 access to skilled experts, offering unmatched cyber security homework help

tutorbin

Trusted by 1.1 M+ Happy Students

Recently Asked cyber security Questions

Expert help when you need it
  • Q1:Before you respond to this discussion, review the YouTube video, "What is the Cyber Kill Chain?" in the Readings and Instructional Material section of Week 5. • How can you apply the concepts from this video as part of an overall cybersecurity and cyber resilience strategy? • What processes, tools, and techniques do you think would be effective to discover and disrupt a cyber-attack while it's underway? This week's chapter of the course textbook focuses on threats, vulnerabilities, and the management processes needed to address them within the cybersecurity and cyber resilience strategy. Chapter 4 Cyber Threats, Vulnerabilities and Intelligence Analysis (Siegel and Sweeney 2020) https://www.youtube.com/watch?v=zhClg4cLemc%20 See Answer
  • Q2:Not all threats and vulnerabilities are the same, nor should they be treated with the same level of response. For example, consider the following scenario. A database server in your organization was implemented 14 years ago and stopped being supported six years ago but serves an important process for a department of nine people, who are its only users. Last week, you discovered a critical vulnerability that was reported to the Common Vulnerabilities and Exposures (CVE) List Links to an external site. https://cve.mitre.org/ . The vulnerability concerns the underlying database product, and no patches are available to remediate the vulnerability. What are some practical risk management techniques you could apply to the situation to reduce risk to an acceptable level, providing access to the system for the small team while limiting the access to everyone else? What might you do to counter the threat of continued use of the system? See Answer
  • Q3:Auditors love to see the NIST CSF in use as a framework because it simplifies their work. NIST provides a mapping of CSF controls to other "authoritative sources such as COBIT, ISO/IEC 27000-series of standards, PCI-DSS, and most others. By implementing the controls in the CSF, compliance to these other regulations and standards is simplified and demonstrable. This is what auditors like the best! • How does Family Educational Rights and Privacy Act (FERPA) play into this mapping to the CSF? • How can the CSF support the information security requirements outlined in FERPA? Which security controls seem the most relevant to assure the needed protections? Include controls from any of the CSF categories and explain why you chose those controls.See Answer
  • Q4:CASE STUDY OF THE ORGANIZATION   Green Prairie Elementary School District 18 (District 18) is an elementary school district in Weld County, Colorado. The district spans 9,500 students and 850 staff among a dozen elementary schools and four middle schools. The district manages an abundance of student, employee, and staff data on its servers.   The pandemic that began in Spring 2020 wreaked havoc on the district’s systems. Classes were relegated to online only. Beginning in April 2020 the problems began.   Some classes were repeatedly subjected to “Zoom bombing” (unwanted intrusions in online classrooms) from outsiders, disrupting courses and forcing some teachers to reset the classrooms, only to find themselves disrupted again and again.    Teachers were complaining to the district offices that they could not access their courses at times, seeing only “404 – Not Found” errors when trying to access the learning management platform.    Parents began complaining to the district that the standard Chromebooks that students need for coursework were prevented from connecting to classes and were seeing the same “404 – Not Found” errors.    The IT support department for District 18 was at a loss as to what was happening and found themselves unable to perform their jobs. They added their voices to the many complaints coming into district administration about what was happening to the district’s systems.  Recently, a staff member in the office of one of the elementary school principals mentioned a suspicious email she received after clicking a link in the message.  She reported that nothing seemed to happen, so she quickly forgot about it until these other incidents were underway.   In public school districts, technology adoption and support is often behind the curve compared to the commercial sector. As with most school districts across the county, the District 18 tech support department is understaffed and has severely limited budget and resources due to reductions in the tax base as businesses shut down. The district has no formal cybersecurity program and the staff of four people who are charged with IT security are only able to accomplish limited work, primarily managing credentials for students, parents, teachers, and staff for accessing their IT systems.   By May 2020, just before the semester’s end, district administrators were frustrated, fed-up, and demanded that something be done to shore up resources and put a program into place to prevent future problems of the current scale. Furthermore, compliance to the Family Educational Rights and Privacy Act (FERPA) was at risk for District 18 and administrators saw the need for an emphasis on protecting student data as well as proprietary and staff data under their care.   After pleading with the Colorado State Department of Education, District 18 was provided budget and resources from a Denver-based security consultancy, CyberCorps, to conduct an evaluation of the problems District 18 was experiencing and was asked to develop a strategy for ongoing cybersecurity and cyber resilience.   As a five-year employee of CyberCorps, you were placed on the team to develop a recommendation to the District 18 School Board regarding what their cyber-strategy should contain, along with a rationale for the strategy.  See Answer
  • Q5:Consider the following scenario. A team within your organization has brought in a WiFi access point and connected it to mobile phone to share its Internet connection with the team, bypassing all controls your security personnel have put in place for devices attached to your network. The team insists that this connection is business critical and can't shut it down without a workable alternative. They've asked you to come in and help them figure out how to conduct their business tasks while maintaining compliance to cybersecurity policies. Identify what controls you would recommend that implement the principles of defense in depth while permitting the work the team needs to complete. Classify those recommended controls according to their objective (prevent, deter, correct, etc.). Justify these choices with reference to the risks they're intended to mitigate.See Answer
  • Q6:Risks regarding financial loss are sometimes tricky to assess and evaluate. In a situation where loss of revenue, loss of access, or loss of reliability occurs but cannot be directly attributed to the lack or failure of a security control, security personnel must obtain a critical understanding of the risks to determine which risk management strategy (remediate, transfer, accept, etc.) to use. For this post, describe such a situation involving loss of revenue or increased costs. Describe at least two techniques provided by risk management to obtain the necessary understanding of risks regarding financial loss or unexpected spending. Explain how at least one of these techniques can be applied to your example. In your responses to classmates, critical and constructively assess their examples and applications of risk management techniques, ask questions, and offer suggestions.See Answer
  • Q7:PURPOSE OF ASSIGNMENT This Week 7 assignment is the third of three constituent parts of the Portfolio Project that was introduced in the Portfolio Project Overview and Case Study. The three assignments are based on the District 18 case study provided in the Overview, and the final paper will be due in Week 10. It is recommended that you review the Portfolio Project Overview and Case Study as you complete each of the three assignments. This last element of your Portfolio Project asks you to develop a plan for how the strategy can be assessed for "fitness" to the NIST Cybersecurity Framework (CSF). You'll map the elements you defined for the strategy and program against a set of requirements. See Answer
  • Q8:Topic 1: "Cyber Security Awareness: Protecting Citizens from Cyber Attack" In writing this assignment, the following aspects will have to be taken into account: 1. What is Cyber Security Awareness?See Answer
  • Q9:• Discuss the threat actors, threat warning, and what makes cyber intelligence different from traditional intelligence disciplines. Assess how cyber threat intelligence can best support the DHS Cybersecurity and Infrastructure Security Agency (CISA). Describe how emerging technologies can support the cyber intelligence.See Answer
  • Q10:How can you capitalise on security awareness engagements to gain the level of feedback to improve the strategy and/or the overall program?See Answer
  • Q11:How can you involve the people making these suggestions to help the process of putting them in place?See Answer
  • Q12:Select a set of controls (subcategory) for any category under any NIST CSF function (identify, protect, detect, etc.) and determine the next likely iteration for control strengthening to the next maturity level.See Answer
  • Q13:Write a case study paper that provides the following: • Background of the company and business objectives. • The architecture of the data warehouse. • The source input systems and the scale at which data is generated. • Data model: a diagram of the star schema with dimensions and fact tables describing how attributes of all tables would meet the requirement of generating actionable business intelligence data. • The ETL processing that is required. • The types of output reporting. • Identify various stakeholders and how they will use the reports. • Are there any data mining techniques being used? How is ad-hoc reporting supported? • Identify any opportunities to apply big data technologies on the data warehouse and discuss how it could be beneficial. This is also a good place to discuss the pros and cons of building a data lake. • Discuss any unique challenges that were encountered during the development of the data warehouse project and how they overcame them. • Submissions should be between 1,750 words and 2,500 words in length. See Answer
  • Q14:How does the exchange between JJ and Paul earlier in this module indicate that this company has thought about contingency planning?See Answer
  • Q15:Should JJ push the issue or initiate the event review process himself?See Answer
  • Q16:What three principles are used to define the C.I.A. triad? Define each in the context in which it is used in information security.See Answer
  • Q17:What is intellectual property? Describe at least one threat to this type of asset.See Answer
  • Q18:Open a Web browser and search for the "OWASP Top Ten." Visit the site. What information is provided here? What does it mean? How could a security manager use this information?See Answer
  • Q19:Open a Web browser and search for "NIST Computer Security Resource Center." Link to the home page. Click the Publications link, then click on the "SP NIST Special Publications" option. Locate SP 800-100. Review the HTML version. What critical information could a security administrator or manager gain from this document? What other documents would be of value to the security manager or technician?See Answer
  • Q20:How often should an organization rehearse its contingency plans?See Answer

TutorBin Testimonials

I found TutorBin Cyber Security homework help when I was struggling with complex concepts. Experts provided step-wise explanations and examples to help me understand concepts clearly.

Rick Jordon

5

TutorBin experts resolve your doubts without making you wait for long. Their experts are responsive & available 24/7 whenever you need Cyber Security subject guidance.

Andrea Jacobs

5

I trust TutorBin for assisting me in completing Cyber Security assignments with quality and 100% accuracy. Experts are polite, listen to my problems, and have extensive experience in their domain.

Lilian King

5

I got my Cyber Security homework done on time. My assignment is proofread and edited by professionals. Got zero plagiarism as experts developed my assignment from scratch. Feel relieved and super excited.

Joey Dip

5

TutorBin helping students around the globe

TutorBin believes that distance should never be a barrier to learning. Over 500000+ orders and 100000+ happy customers explain TutorBin has become the name that keeps learning fun in the UK, USA, Canada, Australia, Singapore, and UAE.