3. UOP CMGT 230 Week 1 Individual Assignment
Individual Access Controls
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/cmgt-230-week-1-individual-assignment-
individual-access-controls-recent
For more classes visit
http://www.uopassignments.com
Instructions:
You have been hired to consult on access controls
for a public health
care provider, which provides medical services to
a surrounding lowerto
lower-middle-class community.
Information about clients of this health care
provider include Personally
Identifiable Information (PII) and Protected
Health Information (PHI),
which is governed by the federal Health Insurance
Portability and
Accountability Act (HIPAA) regulation.
Write a 1- to 2-page briefing paper addressed to
4. the executives at the
heath care provider that makes recommendations
of at least one of the
access control models, covering the following
access control elements:
• Physical access controls that should be in place
• Logical access controls for protection of Data at
Rest (DAR)
• Logical access controls for protection of Data in
Motion (DIM)
Submit your report using the Assignment Files tab.
5. UOP CMGT 230 Week 2 Individual Assignment
Malicious Code NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/cmgt-230-week-2-individual-assignment-
malicious-code-recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 2 Individual
Assignment Individual: Malicious Code
Instructions:
You work for a financial banking firm. There has
been an increase in
attempts to spread malicious code on company
computers.
Write a 1- to 1.5-page Frequently Asked
Questions (FAQ) document
explaining to management what the
characteristics of malicious code
activity look like and what activities should be
monitored to protect
information and data
6. UOP CMGT 230 Week 2 Individual Assignment
Protecting Against Threats NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/cmgt-230--week-2-individual-
assignment-protecting-against-threats-recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 2 Individual Assignment
Individual: Protecting Against Threats
Instructions:
As part of a consulting agreement for a private
financial services
company with approximately 300 endpoints, as
described in Ch. 3 of
SSCP (ISC)2 Systems Security Certified
Practitioner Official Study
7. Guide. You are tasked with providing analysis of
the most common
malicious code and activity to which the
company is exposed.
Create a 10- to 12-slide PowerPoint®
presentation with presenter notes
of a plan to company leadership detailing how to
help protect the
company from the analyzed threats, including:
Network threats
Website vulnerabilities
Desktop controls
In your presentation, include policy
recommendations to confront
threats.
8. UOP CMGT 230 Week 3 Individual Assignment
Business Continuity and Disaster Recovery NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/230-week-3-individual-assignment-
business-continuity-and-disaster-recovery-
recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 3 Individual Assignment
Business Continuity and Disaster Recovery
Instructions:
The public university that has hired you as a
security consultant does
not have in place effective means to handle
incidents associated with
risks and does not have an effective plan in
place for business
continuity or disaster recovery.
Create a 14- to 16-slide PowerPoint®
presentation with presentation
9. notes to members of the university executive
team addressing the
following areas:
• Elements involved in effective handling of
security incidents
• Rationale for a Business Continuity Plan,
what the plan and its
components are
• Rationale for a Disaster Recovery Plan, what
the plan and its
components are
Submityour presentation using the Assignment
Files tab.
10. UOP CMGT 230 Week 3 Individual Assignment Risk
Assessment NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/cmgt-230-week-3-individual-assignment-
risk-assessment-recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 3 Individual Assignment
Individual: Risk Assessment
Instructions:
As part of a consulting agreement for a public
university that offers a
significant number of online programs, you are
tasked with producing a
risk assessment report on the particular risks
faced by the university
and identify ways to address potential incidents.
Research Risk Assessments.
11. Create a 1-page matrix organized as a table with
the following column
headings: Risk Description; Affected divisions or
functions; Impact
(High=5, Medium=3, Low=1); Rank of concern
based on probability and
severity; Mitigation Strategy.List at least five
risks in your matrix.
12. UOP CMGT 230 Week 4 Individual Assignment
Networking and Wireless Security NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/cmgt-230-week-4-individual-assignment-
networking-and-wireless-security-recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 4 Individual Assignment
Networking and Wireless Security
Instructions:
As part of a consulting agreement for a public
library system, you are
tasked with advising the organization on risks
associated with both
wired and wireless networks in the public
facilities managed by the
agency.
Write a 1- to 2-page briefing report with
recommendations for the
agency. Detail the particular risks faced by
exposing the network to
13. public access and the recommended actions or
measures needed to
help decrease risks. Include the following key
topics:
• Physical network security
• Logical network security, including
encryption
• Network firewall and ports/services to
manage
• Wireless networks for employees and guests
• Activity monitoring on library computers
used by the public
14. UOP CMGT 230 Week 4 Individual Assignment
Networking Concepts NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/cmgt-230-week-4-individual-assignment-
networking-concepts-recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 4 Individual Assignment
Networking Concepts
Instructions:
You have been hired by a public library to
consult on improving
security, focusing on network security in the
public facilities it manages.
Create a 1- to 2-page reference document that
lists the basic
technology and concepts involved in networks
so that management
15. might better understand what technology is used
in networking and how
networks function.
Submit your assignment using the Assignment
Files tab.
16. UOP CMGT 230 Week 5 Individual Assignment
Malware Threats NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/uop-cmgt-230-week-5-individual-
assignment-malware-threats-recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 5 Individual Assignment
Malware Threats
Instructions:
Research common malware threats companies
face today.
Using your company or this university as an
example, create a 1/2- to
1-page matrix organized as follows:
• Label the first column "Areas of Concern"
and list three categories in
the first column:
• Endpoints
17. • Servers
• Cloud-based applications
• Label the second column "Threats" and list
particular threats that are
associated with each area of concern
• Label the third column "Threat Mitigation"
and list steps organizations
can take to mitigate those threats to each area of
concern
Submit your matrix using the Assignment Files
tab
18. UOP CMGT 230 Week 5 Individual Assignment
Security for Cloud Computing and Endpoints NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cmgt-230-
uop/cmgt-230-week-5-individual-assignment-
security-for-cloud-computing-and-endpoints-
recent
For more classes visit
http://www.uopassignments.com
CMGT 230 Week 5 Individual Assignment
Security for Cloud Computing and Endpoints
Instructions:
As part of a consulting agreement for a major
package shipping and
delivery company, you are tasked with advising
the company on
security. The company uses a cloud computing
environment for
processing orders and maintaining all company
records concerning
vendors and customers. In addition, the
company utilizes internetbased
applications to communicate over mobile
devices with its delivery
19. drivers in the field. Support personnel in the
office use desktop
computers with typical peripheral devices.
Write a 2- to 3-page report for the company
detailing the particular risks
to its computing resources, including the
benefits and risks of using
Internet-based applications and communications
for the delivery
drivers, as well as common threats facing
computers and servers used
by support personnel in the office