CIS/341 Discussion Questions Week 1-11
A Graded Solutions
Follow the link below to purchase CIS 341 Discussion Solutions
We have all assignments and case studies for CIS 341 and many other Strayer classes. Email us firstname.lastname@example.org if you need help. We can help you get A for your classes.
CIS 341 Week 1 Discussion 1
“Providing Security Over Data” Please respond to the following:
The CIA Triad offers three security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the means in which each of the three tenets are addressed to mitigate risk and enhance security in your chosen environment.
The use of mobile devices to create or access data has gained worldwide appeal and has obtained critical mass. From the e-Activity, summarize the attack and describe how you would mitigate the threat.
CIS 341 Week 1 Discussion 2
“The Changing World of Business” Please respond to the following:
The Internet has revolutionized how some businesses operate. From a security perspective, compare and contrast the brick-and-mortar business environment to an e-Commerce environment.
Considering your experiences, provide a detailed account of how a UC application was successfully used to solve a business challenge. If you do not have an example of a successful use, identify and explain in detail a situation where you believe the use of a UC application could have been used to solve a business challenge.
CIS 341 Week 2 Discussion 1
“Malicious Attacks” Please respond to the following:
In your own words, describe both DoS and DDoS attacks and provide an example that details an actual DoS or DDoS attack. Identify the threats and vulnerabilities from the example you provided and identify how they could have been mitigated.
The use of a Trojan horse or Trojan by an attacker to steal data or gain privileged remote access to a computer is on the rise. Provide in detail an example of the use of Trojans for malicious purposes. Identify threats and vulnerabilities that could allow the execution of a Trojan horse attack and identify how they could have been mitigated.
CIS 341 Week 2 Discussion 2
“Risk Management” Please respond to the following:
With regards to risk-response planning, there are four responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Contrast each of these responses and develop a unique scenario supporting each.
In recent years, the need for business continuity plans and disaster recovery plans has become a high priority for organizations of all sizes. Examine the importance of business continuity and disaster recovery plans, citing examples of each used in practice.
CIS 341 Week 3 Discussion 1
“Access Control” Please respond to the following:
Compare and contrast physical access controls and logical access controls. Further explain how both physical and logical access controls are related to implementing a security policy.
Compare and contrast discretionary access control and mandatory access control. Additionally, choose a business sector and identify which access control method you would institute and why it would be your choice.
CIS 341 Week 3 Discussion 2
“Security Administration” Please respond to the following:
From the e-Activity, summarize the ethical dilemma and describe how you would mitigate the vulnerability.
Explain the role of operations and administration in the effective implementation of a security policy and assess how security policies assist management with respect to communicating the organization’s security tone and culture. Additionally, include the importance of security policies to management and overall organizational security.
CIS 341 Week 4 Discussion 1
“Security Monitoring” Please respond to the following:
Considering your place of employment or your home computing environment, discuss in detail how in-depth (or layered defense) is employed to enhance security in your chosen environment.
Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one example identifying when one would be more appropriate to use than the other.
CIS 341 Week 4 Discussion 2
“Security Testing” Please respond to the following:
Compare and contrast the three categories of security testing methods. Additionally, develop a unique scenario for each of the testing categories and identify why your choice is the best test for the scenario you created. Justify your choice.
A testing road map may include both vulnerability testing and penetration testing. Compare and contrast vulnerability testing and penetration testing, and provide an example of each.
CIS 341 Week 5 Discussion 1
“Risk Management ” Please respond to the following:
Provide and explain two examples of emerging information technology security threats, common response techniques, and the steps required to recover from the attack if it was successfully executed against your organization.
Compare and contrast qualitative risk analysis and quantitative risk analysis, and provide examples identifying a situation when each would be useful.
CIS 341 Week 5 Discussion 2
“Mitigating Risk” Please respond to the following:
Provide and explain an example of an information technology security threat. Analyze how administrative, detective, preventative, and corrective could be used to mitigate the threat.
A Business Impact Analysis (BIA) determines the extent of the impact that a particular incident would have on business operation over time. Identify and provide examples of how people, systems, data, and property will impact a BIA.
CIS 341 Week 6 Discussion 1
“Cryptography” Please respond to the following:
Compare and contrast transposition ciphers and substitution ciphers. Provide one example of each. Outline how the cipher was used and analyze the vulnerabilities of each cipher.
Develop a unique scenario that requires encryption, select the appropriate method (symmetric, asymmetric, or a combination), and justify your choice.
CIS 341 Week 6 Discussion 2
“Cryptography in Practice” Please respond to the following:
It is not uncommon for two or more organizations to collaborate to develop or enhance a product offering. Considering the shared data is extremely sensitive and must be top secret at all costs, formulate a possible solution with consideration to symmetric or asymmetric cryptography and describe the advantages and disadvantages of any solution employed.
The introduction of wireless networks has offered the availability of high throughput communications without the expense of a cabled network. However, this convenience comes at the cost of potentially reduced security. Formulate a possible encryption solution with consideration to WEP, WPA, WPA2, and 802.11i, and describe the advantages and disadvantages of any solution employed.
CIS 341 Week 7 Discussion 1
“Network Security Devices” Please respond to the following:
Select one layer of the OSI model and identify and discuss two vulnerabilities that exist within the layer you selected. Additionally, identify at least one control within the same layer designed to mitigate the identified vulnerability.
From the first e-Activity, discuss why you chose that specific firewall and how it can be incorporated into an enterprise network to enhance security.
CIS 341 Week 7 Discussion 2
“Securing of Network Traffic” Please respond to the following:
Identify and discuss the importance of Virtual Private Networks (VPN) with regard to securing remote network traffic.
Despite the importance of organizational networks, there are countless examples of network breaches. From the second e-Activity, explain the attack scenario and identify at least one control that could have mitigated the threat.
CIS 341 Week 8 Discussion 1
“The Impact of Malware” Please respond to the following:
Identify and discuss the fundamentals of computer viruses and how to mitigate the risks associated with computer viruses. Additionally, provide an example of a computer virus in the wild and discuss the documented damages caused.
Identify and discuss the fundamentals of computer spyware and how to mitigate the risks associated with spyware. Additionally, provide an example of computer spyware in the wild and discuss the documented damages caused.
CIS 341 Week 8 Discussion 2
“Attack Prevention Tools and Techniques” Please respond to the following:
Honeypots and are sacrificial hosts and services deployed on the perimeter of a network to monitor potential hacking activity. Discuss the fundamentals of honeypots and honeynets and identify potential positive and negative consequences of deploying them.
The vast majority of corporate and home computers are connected to a computer network. Identify and discuss how network infrastructure defenses can be employed to mitigate the risk of attack.
CIS 341 Week 9 Discussion 1
“Security Standards” Please respond to the following:
A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security.
The Payment Card Industry Data Security Standard (PCI DSS) is an international standard developed to maintain security over payment card transactions. Analyze a minimum of two provisions of the PCI DSS standard. In your discussion of the two provisions, analyze how the provisions assist in maintaining security over the payment card transaction.
CIS 341 Week 9 Discussion 2
“Information Security Education and Training” Please respond to the following:
Compare and contrast certificate programs and post-secondary degree programs.
Considering the different methods and levels of education and training and professional certifications available, develop an individual development plan that will assist you in meeting your information systems security goals.
CIS 341 Week 10 Discussion 1
“Professional Certifications” Please respond to the following:
Describe the information system job that you would like to hold. Identify which certifications you will need or will be helpful to perform the job and explain your reasoning.
Explain why you should not measure your value or abilities only by the number of certifications you hold.
CIS 341 Week 10 Discussion 2
“Compliance Laws” Please respond to the following:
From the e-Activity, describe the situation where the company was noncompliant and the ramifications to the company and the stakeholders.
Describe the steps and actions that should have been taken in order to maintain compliancy with the law.
CIS 341 Week 11 Discussion 1
“Course Takeaway” Please respond to the following:
Share two new insights about networking security fundamentals you have discovered from this course.
Explain how this type of course is essential for every network security professional.
CIS 341 Week 11 Discussion 2
“Course Wrap-up” Please respond to the following:
Explain five or more key topics discussed during this course that you would like to teach a friend who has a minimal level of information systems security knowledge.
Discuss how you can apply the learning outcomes of this course to your professional and personal life.