CYB 110 Week 1 Assignment Help | University of Phoenix | Assignment Help

CYB 110 Week 1 Assignment Help | University of Phoenix | Assignment Help

Many different threats can arise to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these security risks (like confidentiality only), and other threats affect more than 1 or even all these risks. 

 

Create a 1- to 2-page table in Microsoft Word identifying a minimum of 6 threats using the column headers and details below:  

·         Threat

·         Threat to Type of Data

·         Confidentiality/Integrity/Availability

·         Mitigation Suggestion

 

 Within your table:

·         Identify relevant threats. List 1 per column.

·         Determine the type of data threatened (data-at-rest, data-in-transit, or processing). Identify the data type in the column.

·         Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.

·         Describe the mitigation plan in 2 to 3 sentences in the column. 

 

Example:

Threat: Password Compromise

Threat to Type of Data: Data-At-Rest

Confidentiality/Integrity/Availability: C & I

Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.

 

Include a short paragraph that highlights 2 access control techniques or policies that enforce security. 

 

Cite at least 2 resources to support your assignment.

 

Format your assignment according to APA guidelines. 

 

Submit your assignment. 

 

Resources

·         Center for Writing Excellence

·         Reference and Citation Generator

·         Grammar Assistance

 

Answer Detail

Get This Answer

Invite Tutor