Need Help ?

Samples For "CYB 410 Security Risk Management"

CYB 410 2-1 Activity: Comparing Privacy Protection Laws ...

CYB 410 2-1 Activity: Comparing Privacy Protection Laws

CYB 410 Module Two Activity Guidelines 

Comparing Privacy Protection Laws

Overview

Protecting personal information is an increasingly relevant issue facing both companies and individuals. In response to this, state legislation is evolving in an attempt to increase protections for customers. At the federal level, the Privacy Act of 1974 governs the personally identifiable information of individuals that is maintained by federal agencies. A need grew for legislation at the state level for additional consumer protections that wasn’t addressed by federal regulations. Because of the more needs-based way these laws developed, there is significant variation in existing state laws.

In this activity, you will explore the privacy protection laws of multiple states. When researching the laws in your own state, include such terms in your search as security breach notification, attorney general, privacy protection law, and so on.

Prompt

After reviewing the resources for this module, address the critical elements listed below.

  1. Comparing Privacy Protection Laws
    1. What state from the provided resources offers the best privacy protection laws for consumers?
    2. How do these privacy protection laws compare to the state you live in? Include at least one source for your research.
    3. As a consumer, would you change anything about the privacy protection laws in the state you live in?
    4. Does reviewing the notifications of breaches from the state of California make you reconsider your consumer habits? Why, or why not?

What to Submit

Your submission should be 2–3 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any citations should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.


READ MORE >>

CYB 410 Module One Journal ...

Overview

Journals are private and between you and the instructor only. Approach these activities as an opportunity to reflect upon and apply what you learn each week based on the assigned readings, discussions, and activities. As a successful professional, you will need good reflective and writing skills. Journal activities offer you the opportunity to develop these skills further. The journal entries in this course are graded separately.

Prompt

First, complete the assigned readings for the week. Then discuss the importance of prioritizing cybersecurity risk when it comes to protecting sensitive data, maintaining trust with stakeholders, and mitigating financial and reputational harm. Your entry should include some thoughts on how increased cybersecurity awareness and proactive risk management contribute to a safer and more resilient digital environment for all.

Your journal entry should be 2 paragraphs long and fully address the prompt provided.

In your response, you must address the following critical elements:

  1. Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
  2. Integration and Application: Show good depth of knowledge of the module content and demonstrate that the module content has been read.
  3. Voice: Write in a style that is appropriate for the intended audience and use a consistent voice throughout.

What to Submit

Submit your journal assignment as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. Responses should be at least 2 paragraphs long and address the points indicated in the journal prompt for each module.


READ MORE >>

CYB 410 1-1 Discussion: Introduction to Cyber Risk ...

CYB 410  1-1 Discussion: Introduction to Cyber Risk

Possible Points: 30

Begin by introducing yourself to the class. Include your major and anything you would like to share about yourself. Then address the prompt below.

For your initial post, think about your own personal data and the devices you use at home. In what areas are you the most vulnerable? You might consider areas such as saving passwords in a browser, buying products online, using social media, or saving photos in the cloud. What are your critical risks from these vulnerabilities? Have you taken any steps to address those risks? If so, what have you done?

In your response posts, evaluate which tenet of the confidentiality, integrity, and availability (CIA) triad is most affected by your classmates’ identified risks. Examine how that tenet could be used to inform good decision making.

To complete this assignment, review the Discussion Rubric.


READ MORE >>
WhatsApp