IT 3358 Information Security Concepts for the IT Professional All Units Discussions

IT 3358: Unit 1 Assignment Project Scope
June 4, 2022
IT 3358- Unit 4 Discussion: OS and Application Vulnerability
June 4, 2022

IT 3358 Information Security Concepts for the IT Professional All Units Discussions

IT 3358 Information Security Concepts for the IT Professional All Units Discussions

IT 3358 Information Security Concepts for the IT Professional All Units Discussions
IT3358 Information
Security Concepts for the IT Professional

Unit 1
Discussion

Security Vulnerabilities: Policies and Controls

When developing a network security strategy, you need to
make decisions on what security vulnerabilities need to be controlled in that
environment. In your own words, describe how you believe vulnerabilities for
global organizations differ from those that are non-local or domestic? Provide
at least one (1) example supporting your stance.

IT3358 Information
Security Concepts for the IT Professional

Unit 2
Discussion

AAA Framework and Cryptography

The concepts of auditing, authorization, and accountability
within the area of information security have helped to ease some burdens of IT
security professionals relating to the control of data flow and how data and
network security policies are managed. Describe the relationship between
auditing, authorization, and accountability within data and network security.
Additionally, describe at least one (1) tool that you believe can assist IT
professionals with the security of data and networks and explain how this tool
can be functional in organizations.

IT3358 Information
Security Concepts for the IT Professional

Unit 3
Discussion

Physical Security Controls

The assignment and readings for this week have included
various physical network security controls, practices, and policies. Discuss
why you believe systems and people can be (a) countermeasures, (b)
vulnerabilities, and (c) threats to your physical network assets? Provide at
least one (1) example on how this can be the case for each of these categories.

IT3358 Information
Security Concepts for the IT Professional

Unit 4
Discussion

OS and Application Vulnerability

One of the primary goals when selecting a particular
technology to implement and secure an IT infrastructure is to ensure that data,
operating systems, and applications are secured with competent security tools.
Based on your practical experience and research on this topic, identify a
vulnerability to a specific application and describe at least two (2)
countermeasures or tools you would consider recommending to an organization to
mitigate that vulnerability. In addition, explicate why you believe it is
important for organizations to protect against this vulnerability while
including the potential outcomes if this vulnerability were accepted or
ignored.

IT3358 Information
Security Concepts for the IT Professional

Unit 5
Discussion

Course Reflections

Reflecting on what you have learned in this course, explain
what you believe to be the most concerning security threat to organizations
today and why you believe that to be the case. Additionally, assume you were
implementing a security strategy for an organization that had no previous
security operations; determine the first three (3) security controls you would
consider implementing and explain why you believe these are the most important
to commence these efforts.

IT3358 Information
Security Concepts for the IT Professional

Unit 1
Discussion

Security Vulnerabilities: Policies and Controls

When developing a network security strategy, you need to
make decisions on what security vulnerabilities need to be controlled in that
environment. In your own words, describe how you believe vulnerabilities for
global organizations differ from those that are non-local or domestic? Provide
at least one (1) example supporting your stance.

IT3358 Information
Security Concepts for the IT Professional

Unit 2
Discussion

AAA Framework and Cryptography

The concepts of auditing, authorization, and accountability
within the area of information security have helped to ease some burdens of IT
security professionals relating to the control of data flow and how data and
network security policies are managed. Describe the relationship between
auditing, authorization, and accountability within data and network security.
Additionally, describe at least one (1) tool that you believe can assist IT
professionals with the security of data and networks and explain how this tool
can be functional in organizations.

IT3358 Information
Security Concepts for the IT Professional

Unit 3
Discussion

Physical Security Controls

The assignment and readings for this week have included
various physical network security controls, practices, and policies. Discuss
why you believe systems and people can be (a) countermeasures, (b)
vulnerabilities, and (c) threats to your physical network assets? Provide at
least one (1) example on how this can be the case for each of these categories.

IT3358 Information
Security Concepts for the IT Professional

Unit 4
Discussion

OS and Application Vulnerability

One of the primary goals when selecting a particular
technology to implement and secure an IT infrastructure is to ensure that data,
operating systems, and applications are secured with competent security tools.
Based on your practical experience and research on this topic, identify a
vulnerability to a specific application and describe at least two (2)
countermeasures or tools you would consider recommending to an organization to
mitigate that vulnerability. In addition, explicate why you believe it is
important for organizations to protect against this vulnerability while
including the potential outcomes if this vulnerability were accepted or
ignored.

IT3358 Information
Security Concepts for the IT Professional

Unit 5
Discussion

Course Reflections

Reflecting on what you have learned in this course, explain
what you believe to be the most concerning security threat to organizations
today and why you believe that to be the case. Additionally, assume you were
implementing a security strategy for an organization that had no previous
security operations; determine the first three (3) security controls you would
consider implementing and explain why you believe these are the most important
to commence these efforts.