cyber security and cyber policies, csia 485 week 2 discussion help

User Generated

NqnaXnqr

Computer Science

Description

I need only 2 out of the 3 questions answered in minimum 200 words with APA format and at least one source properly cited.

Unformatted Attachment Preview

University Security Breach Please read the following document, University of Nebraska Breach.doc, which discusses a security breach at one of the country's largest Universities. Discuss the ramifications of the event, what might be the vulnerabilities that were exploited, regulatory and compliance issues associated with the event and what, if you were the CISO would be your recommended course/courses of action to ensure this type of incident did not happen in the future. Please remember to cite your sources. Thoughts on Edward Snowden Please read the following articles: http://www.cnn.com/2014/05/27/us/edward-snowden-interview/ http://www.huffingtonpost.com/2014/05/27/edward-snowden-nbc_n_5400444.html Snowden, during an interview with Brian Williams, stated that he was a trained spy within the context of conducting his normal job routine. What do you feel are the cyber implications that result from his actions and revelations? Please no editorial about his behavior or your patriotism.... let's keep the conversation focused on cyber policies, cyber technologies, or cyber procedures. Threat Model Analysis Please read Microsoft's Threat Model Analysis, http://msdn.microsoft.com/enus/library/aa561499.aspx. Now, describe what you learned. How could you use this model to help improve cyber security in an organization? Please discuss in detail.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: CYBER SECURITY AND CYBER POLICIES

Cyber Security and Cyber Policies

Discussion Responses

Name

Instructor

Institutional Affiliation

Date

1

CYBER SECURITY AND CYBER POLICIES

2

Thoughts on Edward Snowden Discussion

The actions of Edward Snowden generally revealed the vulnerabilities within the security
systems in different government agencies. His revelations actually rendered theses agencies more
vulnerable to attack (Dana Ford). Leaking the critical and classified documents which detailed
t...

Related Tags