CYB 200 Module Two Case Study Colby (2)

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

8

Uploaded by DukeFog10607

Report
2-3 Activity: Data Protection Case Study Kerry Colby CYB-200 Daniel Wand 09/09/2023 CYB 200 Module Two Case Study Template
After reviewing the scenario in the Module Two Case Study Activity Guidelines and Rubric document, fill in the table below by completing the following steps for each control recommendation: 1. Specify which Fundamental Security Design Principle best applies by marking all appropriate cells with an X . 2. Indicate which security objective (confidentiality, availability, or integrity) best reflects your selected control recommendation. 3. Explain your choices in one to two sentences, providing a selection-specific justification to support your decision. Control Recommendations Least Privilege Layering (Defense in Depth) Fail-Safe Defaults / Fail Secure Modularity Usability Security Objective Alignment (CIA) Explain your Choices (1-2 sentences) Automatically lock workstation sessions after a standard period of inactivity. (Completed as an example) X C I chose layering because it adds another layer of protection for the confidentiality of our data. If possible, close and lock your office door when leaving your computer. X C I choose layering because adding a locked door adds an extra layer to keep the items inside confidential. Use technology to make sure that only authorized software executes, and unauthorized software is blocked from executing on assets. X C + I I choose fail- safe/fail-secure because it blocks unauthorized software from executing. Fail- secure protects data in the event
Control Recommendations Least Privilege Layering (Defense in Depth) Fail-Safe Defaults / Fail Secure Modularity Usability Security Objective Alignment (CIA) Explain your Choices (1-2 sentences) of a breach or alter so I also went with C + I Use automated tools to inventory all administrative accounts to ensure that only authorized individuals have elevated privileges. X A I choose least privilege because people with more authorization can access info that others may not. This also aligns with availability because only certain info in available for curtain individuals. Use system configuration management tools to automatically reapply configuration settings to systems at regularly scheduled intervals. X I I choose modularity because each task is broken into its regular intervals. I also selected integrity as it is maintained in a correct and updated state. Maintain an inventory of all sensitive information stored or transmitted by the organization's technology systems, X A I choose usability because while
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: An 100.0000-kg man who pushes a crate 3.0000 m up along a ramp that makes an angle of 20° with the…
Q: m¹n_temp = None min_index = None for i in range (len (temps)): if : min_temp = temps [i]
Q: On June 1, 2023, Culver spent $9,720 to successfully prosecute a patent infringement suit. As a…
Q: (4) Construct Mohr's Circle for the state of stress at Point B. Use the Mohr's Circle to construct a…
Q: Fuel is draining from the bottom of a cone-shaped funnel at the rate of 0.3 cubic ft/sec. The height…
Q: Which of the following equations is the correct one to use to determine the oxidation state of N in…
Q: Boyle’s Law states that when a sample of gas is compressedat a constant temperature, the pressure P…
Q: 1. The floor of a rectangular building has an area of 120 square meter. The length of the floor / is…
Q: Other than being a critical component of operations, quality has implications for three other…
Q: . A doubly-homozygous red-flowered plant is crossed with a doubly-homozygous white-flowered plant.…
Q: The number x of MP3 music players that a store will sell and their price p (in dollars) are related…
Q: Write a balanced net ionic equation to show why the solubility of ZnCO3 (s) increases in the…
Q: a. Determine the capacity of this process.       b. Which action would yield the greatest increase…
Q: The question clearly states Coral help, this is done in python. I am actually solid in Python.…
Q: Use the given information to find the critical values and 2. (Use technology or the attached…
Q: Determine whether the series convergent or divergent. Σ(-7)* K+3 absolutely convergent, conditional…
Q: Natalia has a monthly net income of $1,400. She has a house payment of $600 per month, a car loan…
Q: Suppose a farmer has a fixed resource of 80 acres planted in corn. If the farmer does not cultivate…
Q: A 2004 Prius with a 150 lb driver and no passengers weighs 3071 lb. The car is initially at rest.…
Q: 1. Calculate the work done from x = 0 to x = 7 m by the one-dimensional force depicted in the…
Q: What is the common name of the product of below
Q: 2. CO₂ + H₂O → C6H12O6 + 0₂ [F