CYB 200 Module 1-3 Activity - Security Objective Mapping PDF

Title CYB 200 Module 1-3 Activity - Security Objective Mapping
Author Sam Fowler
Course Cyber Foundations
Institution Southern New Hampshire University
Pages 2
File Size 99.5 KB
File Type PDF
Total Downloads 52
Total Views 122

Summary

Overview: In this activity, you will demonstrate how Fundamental Security Design Principles can be employed to achieve the basic security objectives of
confidentiality, integrity, and availability (CIA triad).
Prompt: Complete the steps listed below.
1. Read the article, “Employ F...


Description

Sam Fowler CYB-200 1-3 Activity: Security Objective Mapping

Topic Check the Website for the latest updates and patches to your anti-virus program (monthly).

Category Integrity

Lock your keyboard when you step away from your computer for even a moment.

Confidentiality

Change your password every 120 days.

Confidentiality

Always use strong passwords and keep them secret.

Confidentiality

When off campus, access Purdue directories only through VPN.

Confidentiality

Never store sensitive

Confidentiality

Justification Source Checking your A/V to ensure you have Why You Should Update Your Antivirus the latest definitions is a way to ensure Software Frequently you are not vulnerable to malware (computerhowtoguide.com) created between definition releases. Locking your keyboard when stepping away is a way to ensure no one else is Lock Your Keyboard When Leaving the able to use your system to access data Area | The Computer Security Journal they should not have access to. This would be an insider problem. Changing your password regularly is a means for protecting the access to a https://carleton.ca/its/2017/change-yourservice or system. This limits breaches, password-regularly/ prevents constant access, and prevents the use of saved passwords Passwords must be confidential to ensure only those who require access to https://carleton.ca/its/2017/change-youra service or system using the password password-regularly/ are those who are granted access. VPNs create an encrypted tunnel, What Is a VPN, and Why You Need One protecting the access to private data | PCMag when using public or less protected connections. PPI should always be secured. PPI Securing Your Computer to Maintain

personal information such as your bank account stored on your computer would be information or Social something looked for first if your Security numbers on your system is compromised. computer. Run a complete scan of Scanning your system on a regular your system using the antibasis ensures the integrity of your virus and anti-spyware Integrity computer. It ensures you have not been software applications infected with malware and if so, allows (weekly). you to remove the malware. Never click on links in an The link displayed in the email could email, even if they are easily be edited to direct you to a from someone you know. Confidentiality different URL or IP address. This is a Type the address in your way that systems have been infected browser window instead. with ransomware. Checking your email through a free or Never check your Purdue public internet puts you in danger of email account on a “free” being compromised. For example, there Integrity or “public” Internet kiosk could be a keylogger on the system or Internet Café. which will capture all of your keystrokes, including credentials.

Your Privacy | Privacy Rights Clearinghouse

Securing Your Computer to Maintain Your Privacy | Privacy Rights Clearinghouse

Do Not Click On Links In Email Messages! | Bruceb Consulting

12 Reasons You Should NEVER Use the Public Wi-Fi - Due...


Similar Free PDFs