I need help pleaseModule 2 – CaseBuilding Security AwarenessCase Assignment

I need help please

Module 2 – Case

Building Security Awareness

Case Assignment

Given the many security threats to information and infrastructure discussed in Module 2 you will analyze the prevalence of these threats in the United States. Analysis of each of these threats in terms of organizations and government entities is a key topic in this country, not only to secure trade secrets and operations in organizations, but to secure the democratic government at the national and state levels.


Module 2 Video

Assignment Expectations

Using the types of security threats discussed in Module 2, review the trade journals, newspapers, and other sources on the Internet to discuss the prevalence of these attacks on organizations and government entities in the United States.

This will be graded in terms of the number of attacks uncovered and the firms/government agencies targeted. You need to provide references for each attack and discuss the impact of that attack.

You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the 

Trident APA 7 Guide
 at proper formatting and style.

Module 2 – Resources

Building Security Awareness

Required Reading

Required Reading

(2022). Cybersecurity Awareness: Getting Started with Security Foundations. 

Finding Skillsoft Books   
(This is a course that you will launch.)

Carey, M.J. and Jin, J. (2020). Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership. John Wiley & Sons. Read any 5 chapters in this book. 

Finding Skillsoft Books

Sohaib, M. (2021). Ethical Hacker’s Certification Guide (CEHv11), BPB Publications. Chapters 4 and 5. 

Finding Skillsoft Books


Welcome to threat hunting
 from LinkedIn Learnig. Please note that this link will open in a new window and may require activation of a LinkedIn account on the first attempt. Trident students may use their student email address to access this free subscription to LinkedIn Learning as a part of this course.

Optional Reading

Harris, S., & Maymi, F. (2018). CISSP all-in-one exam guide, seventh edition, 8th edition (7th ed.) McGraw-Hill, Chapter 2. 

Finding Skillsoft Books

Read Chapter 1


Risk management for enterprises and individuals
 (2017)  Book under Creative Commons 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Need this expanded 4Security Recommendations ReportsTung NkengazongSecurity

Need this expanded  4 Security Recommendations Reports Tung Nkengazong Security Recommendations Reports The critical security challenges of BRI require a comprehensive security strategy that is multi-dimensional in approach. In the first place, BRI needs to enhance controls over-identification and authentication. Adoption of multi-factor authentication (MFA) will drastically reduce the likelihood

Please review attachmentsStudent Name: _________________ Program: Project Management Essentials Lesson 12 Assignment Lesson 12 Assignment

Please review attachments Student Name: _________________ Program: Project Management Essentials Lesson 12 Assignment Lesson 12 Assignment Handout Assignment Instructions For this assignment, you will develop a stakeholder register based on the information in the project overview. The project overview and a template table have been provided in the handout below.

100 word response 1 reference due 6/22/2024Emmons Discussion 3-3:

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3: Compliance within the Remote Access Domain What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?  What risks, threats, and vulnerabilities are introduced by implementing a remote