CIS 560 WEEK 1 DISCUSSION

CIS 560 WEEK 1 DISCUSSION

 

 

 

CIS 560 Week 1 Discussion

“Access Control”  Please respond to the following IN YOUR OWN WORDS:

Think of an organization that you are familiar with.  Assume that you are the IT Manager concerned with access control.  Chose an area (I.e. Network, etc.) that you consider to be the most important with regards to access control. What is the biggest threat (other than the users themselves) for that area?  What would be some of your potential vulnerabilities in that area?  Explain your responses

 

 

CIS 560 Week 1 Discussion

“Access Control”  Please respond to the following IN YOUR OWN WORDS:

Think of an organization that you are familiar with.  Assume that you are the IT Manager concerned with access control.  Chose an area (I.e. Network, etc.) that you consider to be the most important with regards to access control. What is the biggest threat (other than the users themselves) for that area?  What would be some of your potential vulnerabilities in that area?  Explain your responses

 

CIS 560 Week 1 Discussion

“Access Control”  Please respond to the following IN YOUR OWN WORDS:

Think of an organization that you are familiar with.  Assume that you are the IT Manager concerned with access control.  Chose an area (I.e. Network, etc.) that you consider to be the most important with regards to access control. What is the biggest threat (other than the users themselves) for that area?  What would be some of your potential vulnerabilities in that area?  Explain your responses

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-1-discussion/

 

 

 

 

 

 

 

CIS 560 Week 1 Discussion

“Access Control”  Please respond to the following IN YOUR OWN WORDS:

Think of an organization that you are familiar with.  Assume that you are the IT Manager concerned with access control.  Chose an area (I.e. Network, etc.) that you consider to be the most important with regards to access control. What is the biggest threat (other than the users themselves) for that area?  What would be some of your potential vulnerabilities in that area?  Explain your responses

 

 

CIS 560 WEEK 3 DISCUSSION

CIS 560 WEEK 3 DISCUSSION

 

 

 

CIS 560 Week 3 Discussion

Access Control in Business.   Please respond to the following in YOUR OWN WORDS:

  1. Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
  2. The 3 access control strategies include DAC, MAC, and RBAC.  Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.

 

CIS 560 Week 3 Discussion

Access Control in Business.   Please respond to the following in YOUR OWN WORDS:

  1. Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
  2. The 3 access control strategies include DAC, MAC, and RBAC.  Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.CIS 560 Week 3 DiscussionAccess Control in Business.   Please respond to the following in YOUR OWN WORDS:
    1. Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
    2. The 3 access control strategies include DAC, MAC, and RBAC.  Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.

     

  3. https://hwacer.com/Tutorial/cis-560-week-3-discussion/
  4.  

    CIS 560 Week 3 Discussion

    Access Control in Business.   Please respond to the following in YOUR OWN WORDS:

    1. Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
    2. The 3 access control strategies include DAC, MAC, and RBAC.  Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.

 

 

 

 

 

 

 

CIS 560 WEEK 2 DISCUSSION

CIS 560 WEEK 2 DISCUSSION

 

 

CIS 560 WEEK 2 DISCUSSION

Acceptable Use Policy and Access Control”  Please respond to the following IN YOUR OWN WORDS:

 

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control.

I need specific items, not just a general discussion of the importance of the AUP.

(Hint: Not everything in an AUP is also part of Access Control.  I’m only concerned with what is associated with access control)

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-2-discussion/

 

 

 

 

 

 

 

CIS 560 WEEK 2 DISCUSSION

Acceptable Use Policy and Access Control”  Please respond to the following IN YOUR OWN WORDS:

 

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control.

I need specific items, not just a general discussion of the importance of the AUP.

(Hint: Not everything in an AUP is also part of Access Control.  I’m only concerned with what is associated with access control)

CIS 560 WEEK 4 DISCUSSION

CIS 560 WEEK 4 DISCUSSION

 

 

CIS 560 Week 4 Discussion

“The human aspect”  Please respond to the following:

  1. Assume that you have to hire someone who will have a high level of access in your company. What kinds of considerations should an HR person have when hiring someone like this?  Some organizations check your credit score.  Is that fair?
  2. What kinds of controls would you have in an accounting environment to avoid potential embezzlement?  Name at least 5 controls and discuss how they would prevent someone from being able to embezzle money.

 

CIS 560 Week 4 Discussion

“The human aspect”  Please respond to the following:

  1. Assume that you have to hire someone who will have a high level of access in your company. What kinds of considerations should an HR person have when hiring someone like this?  Some organizations check your credit score.  Is that fair?
  2. What kinds of controls would you have in an accounting environment to avoid potential embezzlement?  Name at least 5 controls and discuss how they would prevent someone from being able to embezzCIS 560 Week 4 Discussion
  3. “The human aspect”  Please respond to the following:
    1. Assume that you have to hire someone who will have a high level of access in your company. What kinds of considerations should an HR person have when hiring someone like this?  Some organizations check your credit score.  Is that fair?
    2. What kinds of controls would you have in an accounting environment to avoid potential embezzlement?  Name at least 5 controls and discuss how they would prevent someone from being able to embezzle money. 

    3. https://hwacer.com/Tutorial/cis-560-week-4-discussion/
    4. CIS 560 Week 4 Discussion

      “The human aspect”  Please respond to the following:

      1. Assume that you have to hire someone who will have a high level of access in your company. What kinds of considerations should an HR person have when hiring someone like this?  Some organizations check your credit score.  Is that fair?
      2. What kinds of controls would you have in an accounting environment to avoid potential embezzlement?  Name at least 5 controls and discuss how they would prevent someone from being able to embezzle money.

     

 

CIS 560 WEEK 5 DISCUSSION

CIS 560 WEEK 5 DISCUSSION

 

 

 

 

 

CIS 560 WEEK 5 DISCUSSION

“Physical Security Access”  Please respond to the following IN YOUR OWN WORDS:

Assume you are interviewing for the position of IT Security Manager.  The Chief Security Officer hands you the case from our e-activity and asks you to suggest ways that the data center could have prevented the intruders from being able to enter the building. She also asks you to determine which of these methods is the most predictable and explain why.  What is your response?

Later in the interview, she asks you to propose some methods that could be applied to data protection even if assets like servers, laptop computers, and tablets were stolen. She asks you which

of these methods you believe would be the most effective and why.  What is your response?

 

 

 

https://hwacer.com/Tutorial/cis-560-week-5-discussion/

 

 

 

 

 

 

 

 

 

 

CIS 560 WEEK 5 DISCUSSION

“Physical Security Access”  Please respond to the following IN YOUR OWN WORDS:

Assume you are interviewing for the position of IT Security Manager.  The Chief Security Officer hands you the case from our e-activity and asks you to suggest ways that the data center could have prevented the intruders from being able to enter the building. She also asks you to determine which of these methods is the most predictable and explain why.  What is your response?

Later in the interview, she asks you to propose some methods that could be applied to data protection even if assets like servers, laptop computers, and tablets were stolen. She asks you which of these methods you believe would be the most effective and why.  What is your response?

 

 

 

CIS 560 WEEK 6 DISCUSSION

CIS 560 WEEK 6 DISCUSSION

 

 

 

CIS 560 Week 6 Discussion

“Enterprise Access Control”  Please respond to the following IN YOUR OWN WORDS:

Read the article in the e-Activity.  It suggests that many medical facilities may have been complacent about data security.  If your were a CSO (Chief Security Officer) or CCO (Chief Compliance Officer) of a facility that did not have good access controls, how would you bring your facility into compliance? What steps would you take?

Also, separately, explain whether you believe health care should or shouldn’t be accessible via mobile devices, and why or why not

Go to e-Week’s Website and read “Health Care Data Breaches Increase by 32 Percent: Ponemon Report”, located at http://www.eweek.com/c/a/Health-Care-IT/Health-Care-Data-Breaches-Increase-by-32-Percent-Ponemon-Report-233543/.

 

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-6-discussion/

 

 

 

 

 

 

CIS 560 Week 6 Discussion

“Enterprise Access Control”  Please respond to the following IN YOUR OWN WORDS:

Read the article in the e-Activity.  It suggests that many medical facilities may have been complacent about data security.  If your were a CSO (Chief Security Officer) or CCO (Chief Compliance Officer) of a facility that did not have good access controls, how would you bring your facility into compliance? What steps would you take?

Also, separately, explain whether you believe health care should or shouldn’t be accessible via mobile devices, and why or why not

Go to e-Week’s Website and read “Health Care Data Breaches Increase by 32 Percent: Ponemon Report”, located at http://www.eweek.com/c/a/Health-Care-IT/Health-Care-Data-Breaches-Increase-by-32-Percent-Ponemon-Report-233543/.

CIS 560 WEEK 9 DISCUSSION

CIS 560 WEEK 9 DISCUSSION

 

 

 

CIS 560 WEEK 9 DISCUSSION

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

    CIS 560 WEEK 9 DISCUSSION

    ‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

     

    • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

    ‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

     

    • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

CIS 560 WEEK 9 DISCUSSION

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

CIS 560 WEEK 9 DISCUSSION

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

 

 

 

CIS 560 WEEK 8 DISCUSSION

CIS 560 WEEK 8 DISCUSSION

 

 

 

 

CIS 560 WEEK 8 DISCUSSION

 

 

Access Control and VPN “ Please respond to the 2 of the following IN YOUR OWN WORDS:

 

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why?
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

 

 

Access Control and VPN “ Please respond to the 2 of the following IN YOUR OWN WORDS:

 

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why?
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

 

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-8-discussion/

 

 

 

 

 

 

 

CIS 560 WEEK 8 DISCUSSION

 

 

Access Control and VPN “ Please respond to the 2 of the following IN YOUR OWN WORDS:

 

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why?
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

 

 

Access Control and VPN “ Please respond to the 2 of the following IN YOUR OWN WORDS:

 

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why?
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

 

 

 

 

CIS 560 WEEK 5 MIDTERM EXAM

CIS 560 WEEK 5 MIDTERM EXAM

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

https://hwacer.com/Tutorial/cis-560-week-5-midterm-exam/

 

 

 

 

 

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

CIS 560 WEEK 11 FINAL EXAM

CIS 560 WEEK 11 FINAL EXAM

 

 

 

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

 

 

 

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

 

 

 

 

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15