Presentation is loading. Please wait.

Presentation is loading. Please wait.

CIS 333 Course Experience Tradition/ snaptutorial.com

Similar presentations


Presentation on theme: "CIS 333 Course Experience Tradition/ snaptutorial.com"— Presentation transcript:

1 CIS 333 Course Experience Tradition/ snaptutorial.com

2

3 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 1 Quiz 2 • Question 1 E-commerce systems and applications demand strict C-I-A ________. • Question 2 During the late 1980s into the early 1990s, service providers converted the core switches at their central offices from ______________ to digital central office (CO) switches.

4 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 1 Quiz • Question 1 The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site. • Question 2 ____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage.

5 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 2 Quiz 3 • Question 1 A(n) ___________ fingerprint scanner is a software program that allows an attacker to send logon packets to an IP host device. • Question 2 What is meant by firewall?

6 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 2 Quiz 4 • Question 1 Which of the following best describes quantitative risk analysis? • Question 2 ________ is the difference between the security controls you have in place and the controls you need to have in place in order to address all vulnerabilities.

7 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 3 Case Study 1: Bring Your Own Device (BYOD) Case Study 1: Bring Your Own Device (BYOD) Due Week 3 and worth 60 points Read the following articles located in the course shell: “The dark side of BYOD” from TechRepublic and “BYOD As We Know It Is Dead” from Forbes. Write a two to three (2-3) page paper in which you: Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user’s overall working experience.

8 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 3 Quiz 6 • Question 1 What term is used to describe a benchmark used to make sure that a system provides a minimum level of security across multiple applications and across different products? • Question 2 Because personnel are so important to solid security, one of the best security controls you can develop is a strong security ___________ and awareness program.

9 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Due Week 4 and worth 75 points You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC)

10 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 4 Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Due Week 4 and worth 75 points You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC)

11 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 4 Quiz 7 • Question 1 It’s essential to match your organization’s required __________ with its security structure. • Question 2 ________ provides information on what is happening as it happens.

12 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 6 Case Study 2: Public Key Infrastructure Case Study 2: Public Key Infrastructure Due Week 6 and worth 60 points Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization.

13 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 8 Assignment 2 Identifying Potential Risk, Response, and Recovery Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization

14 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 8 Assignment 2: Identifying Potential Risk, Response, and Recovery Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

15 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 10 Technical Project Paper: Information Systems Security Technical Project Paper: Information Systems Security Due Week 10 and worth 150 points Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared toward protecting medication and funds located on the premises, as well as the customers

16 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 11 Exam • Question 1 The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists. • Question 2 Connecting your computers or devices to the ________ immediately exposes them to attack.

17 CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Week 11 Exam • Question 1 The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists. • Question 2 Connecting your computers or devices to the ________ immediately exposes them to attack.

18

19 CIS 333 Course Experience Tradition/ snaptutorial.com


Download ppt "CIS 333 Course Experience Tradition/ snaptutorial.com"

Similar presentations


Ads by Google