Title | CYB 200 Module 1-3 Activity - Security Objective Mapping |
---|---|
Author | Sam Fowler |
Course | Cyber Foundations |
Institution | Southern New Hampshire University |
Pages | 2 |
File Size | 99.5 KB |
File Type | |
Total Downloads | 52 |
Total Views | 122 |
Overview: In this activity, you will demonstrate how Fundamental Security Design Principles can be employed to achieve the basic security objectives of
confidentiality, integrity, and availability (CIA triad).
Prompt: Complete the steps listed below.
1. Read the article, “Employ F...
Sam Fowler CYB-200 1-3 Activity: Security Objective Mapping
Topic Check the Website for the latest updates and patches to your anti-virus program (monthly).
Category Integrity
Lock your keyboard when you step away from your computer for even a moment.
Confidentiality
Change your password every 120 days.
Confidentiality
Always use strong passwords and keep them secret.
Confidentiality
When off campus, access Purdue directories only through VPN.
Confidentiality
Never store sensitive
Confidentiality
Justification Source Checking your A/V to ensure you have Why You Should Update Your Antivirus the latest definitions is a way to ensure Software Frequently you are not vulnerable to malware (computerhowtoguide.com) created between definition releases. Locking your keyboard when stepping away is a way to ensure no one else is Lock Your Keyboard When Leaving the able to use your system to access data Area | The Computer Security Journal they should not have access to. This would be an insider problem. Changing your password regularly is a means for protecting the access to a https://carleton.ca/its/2017/change-yourservice or system. This limits breaches, password-regularly/ prevents constant access, and prevents the use of saved passwords Passwords must be confidential to ensure only those who require access to https://carleton.ca/its/2017/change-youra service or system using the password password-regularly/ are those who are granted access. VPNs create an encrypted tunnel, What Is a VPN, and Why You Need One protecting the access to private data | PCMag when using public or less protected connections. PPI should always be secured. PPI Securing Your Computer to Maintain
personal information such as your bank account stored on your computer would be information or Social something looked for first if your Security numbers on your system is compromised. computer. Run a complete scan of Scanning your system on a regular your system using the antibasis ensures the integrity of your virus and anti-spyware Integrity computer. It ensures you have not been software applications infected with malware and if so, allows (weekly). you to remove the malware. Never click on links in an The link displayed in the email could email, even if they are easily be edited to direct you to a from someone you know. Confidentiality different URL or IP address. This is a Type the address in your way that systems have been infected browser window instead. with ransomware. Checking your email through a free or Never check your Purdue public internet puts you in danger of email account on a “free” being compromised. For example, there Integrity or “public” Internet kiosk could be a keylogger on the system or Internet Café. which will capture all of your keystrokes, including credentials.
Your Privacy | Privacy Rights Clearinghouse
Securing Your Computer to Maintain Your Privacy | Privacy Rights Clearinghouse
Do Not Click On Links In Email Messages! | Bruceb Consulting
12 Reasons You Should NEVER Use the Public Wi-Fi - Due...