SEC 360 DeVry Complete Week Discussions Package
SEC 360 DeVry Complete Week Discussions Package
SEC 360 DeVry Week 1 Discussion 1 Latest
Security Policy (graded)
Policy is central to affecting security in organizations. Using the security policy for your workplace (or other organization with which you are familiar), what are some key features that allow personnel to control security? Are there any deficiencies? What can be added that would improve security?
SEC 360 DeVry Week 1 Discussion 2 Latest
Security CBK (graded)
The security Common Body of Knowledge (CBK) describes what security professionals collectively know about the discipline. What knowledge domains are included in the CBK? What do you think will be added to the CBK in the future? This section lists options that can be used to view responses.
SEC 360 DeVry Week 2 Discussion 1 Latest
Compliance Legislation (HIPAA) (graded)
How can we utilize the four types of security policies to develop a HIPAA security program for organizations? What kinds of information does HIPAA protect? What kinds of organizations does HIPAA cover?
SEC 360 DeVry Week 2 Discussion 2 Latest
Intellectual Property (IP) (graded)
Your organization has asked you to assist in the discussion about how to best protect its intellectual property (IP). The engineers in your organization have developed new database and ordering software to support a faster process for fulfilling customer orders. Which of the various forms of IP protection will you recommend for safeguarding the engineers’ work? Should it be protected at all? What does the organization risk by getting IP protection?
SEC 360 DeVry Week 3 Discussion 1 Latest
Snack Cake Security (graded)
Your company has a special recipe for snack cakes. This snack cake is a key product in your company’s lineup, and it is responsible for a large majority of shareholder value. Using a security model described in the text, describe
SEC 360 DeVry Week 3 Discussion 2 Latest
Security and the OSI Model (graded)
Security can have a cumulative effect. Consider the OSI model as a key component of the Common Body of Knowledge. For definitions of OSI layers, click here: .next.ecollege.com/ec/Courses/13775/CRS-DVUO-2148869/SSO/hub2/sso.html?node=2299″>OSI Layers. What is the OSI model about, and how can we use it when we are selecting security controls? e an approach that will allow this important recipe to be kept secure.
SEC 360 DeVry Week 4 Discussion 1 Latest
Amusement Security (graded)
Your company is in the business of entertainment; they run an amusement park. There are thousands of people all over the park every day. It is very important to control who has access to what, and not just for visitors, but for employees as well. Define groups of people, and indicate how you would control physical access for them.
SEC 360 DeVry Week 4 Discussion 2 Latest
Security Operations Changes (graded)
Describe how to insert changes in the operational security of the organization. How do you manage those who do not want to accept the changes? This section lists options that can be used to view responses.
SEC 360 DeVry Week 5 Discussion 1 Latest
Backup and Recovery Planning (graded)
Why are backups so often overlooked in an organization? How do we sell the benefits of spending money on backup solutions to business managers and executives?
SEC 360 DeVry Week 5 Discussion 2 Latest
Access Control Lists (graded)
Access control lists are very valuable for administering granular control over an organization’s resources. So why do a lot of organizations opt not to use them in lieu of more general super user or administrator accounts?
SEC 360 DeVry Week 6 Discussion 1 Latest
Which algorithm is more secure: AES256 or AES128? Why?
SEC 360 DeVry Week 6 Discussion 2 Latest
The Enterprise Firewall is Dead (graded)
A popular computer network publication stated at one time that the enterprise firewall was dead. It boldly stated that the exterior firewalls of the organization should be torn down and replaced with host-based firewalls instead. Is this insane, or is it the best new practice in security management? Explain your answer. This section lists options that can be used to view responses.
SEC 360 DeVry Week 7 Discussion 1 Latest
Intrusion Detection (graded)
Your organization’s business manager has read an article about how intrusion detection systems can help deter hackers. He or she wants to spearhead a campaign to deploy them around the company’s locations in three states. Since an IDS can help deter hackers, does this make it a worthwhile project, or is there some reason to be wary? Specific to this example, how do you respond to ad hoc security requests like this? In general, how can you keep requests like this in check
SEC 360 DeVry Week 7 Discussion 2 Latest
Secure as a Car (graded)
Engineering software is like engineering a car; if one were so inclined, there could be a completely bug- and security-free application. Do you agree with this? Why or why not?
ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO, ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERAL QUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI, LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT