Week 2 Discussions

 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

University Security Breach

Actions for University Security Breach

Must post first.

Please read the following document, University of Nebraska Breach , which discusses a security breach at one of the country’s largest Universities.  Discuss the ramifications of the event, what might be the vulnerabilities that were exploited, regulatory and compliance issues associated with the event and what, if you were the CISO would be your recommended course/courses of action to ensure this type of incident did not happen in the future.  Please remember to cite your sources.

Thoughts on Edward Snowden

Actions for Thoughts on Edward Snowden

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Must post first.

Please read the following articles:

  • http://www.cnn.com/2014/05/27/us/edward-snowden-interview/
  • http://www.huffingtonpost.com/2014/05/27/edward-snowden-nbc_n_5400444.html

Snowden, during an interview with Brian Williams, stated that he was a trained spy within the context of conducting his normal job routine. What do you feel are the cyber implications that result from his actions and revelations? Please no editorial about his behavior or your patriotism…. let’s keep the conversation focused on cyber policies, cyber technologies, or cyber procedures.  

Threat Model Analysis

Actions for Threat Model Analysis

Must post first.

Please read Microsoft’s Threat Model Analysis, 

http://msdn.microsoft.com/en-us/library/aa561499.aspx

.

Now, describe what you learned. How could you use this model to help improve cyber security in an organization? Please discuss in detail.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER