I need help pleaseModule 2 – CaseBuilding Security AwarenessCase Assignment

I need help please

Module 2 – Case

Building Security Awareness

Case Assignment

Given the many security threats to information and infrastructure discussed in Module 2 you will analyze the prevalence of these threats in the United States. Analysis of each of these threats in terms of organizations and government entities is a key topic in this country, not only to secure trade secrets and operations in organizations, but to secure the democratic government at the national and state levels.


Module 2 Video

Assignment Expectations

Using the types of security threats discussed in Module 2, review the trade journals, newspapers, and other sources on the Internet to discuss the prevalence of these attacks on organizations and government entities in the United States.

This will be graded in terms of the number of attacks uncovered and the firms/government agencies targeted. You need to provide references for each attack and discuss the impact of that attack.

You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the 

Trident APA 7 Guide
 at proper formatting and style.

Module 2 – Resources

Building Security Awareness

Required Reading

Required Reading

(2022). Cybersecurity Awareness: Getting Started with Security Foundations. 

Finding Skillsoft Books   
(This is a course that you will launch.)

Carey, M.J. and Jin, J. (2020). Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership. John Wiley & Sons. Read any 5 chapters in this book. 

Finding Skillsoft Books

Sohaib, M. (2021). Ethical Hacker’s Certification Guide (CEHv11), BPB Publications. Chapters 4 and 5. 

Finding Skillsoft Books


Welcome to threat hunting
 from LinkedIn Learnig. Please note that this link will open in a new window and may require activation of a LinkedIn account on the first attempt. Trident students may use their student email address to access this free subscription to LinkedIn Learning as a part of this course.

Optional Reading

Harris, S., & Maymi, F. (2018). CISSP all-in-one exam guide, seventh edition, 8th edition (7th ed.) McGraw-Hill, Chapter 2. 

Finding Skillsoft Books

Read Chapter 1


Risk management for enterprises and individuals
 (2017)  Book under Creative Commons 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 a

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 and was enacted to assist reform the financial industry and address consumer financial privacy concerns (Federal Trade Commission, 2023). GLBA possesses requirements for the Federal Trade Commission and

200 word response 1 reference Due 6/8/2024JacksonDiscussion 2-2: Conducting an IT

200 word response 1 reference Due 6/8/2024 Jackson Discussion 2-2: Conducting an IT Infrastructure Audit for Compliance IT security policies have a high level of importance for a compliance audit. As defined by Fortinet, and IT Security Policy “identifies the rules and procedures for all individuals and using an organization’s

Find videos showing a real-world health system. Then, conduct research for each following items:Provide the title of the video, and the Web link. Then,

Find videos showing a real-world health system. Then, conduct research for each following items: Provide the title of the video, and the Web link. Then, summarize it–including details, features, functions, contents, etc.), stakeholders, markets, and elaborate business value(s) it delivers and/or enables. Imagine you are the owner or the system analyst

300 words due 6/5/50242 referencesDiscussion 2-1: Aligning an IT Security Assessment

300 words due 6/5/5024 2 references Discussion 2-1: Aligning an IT Security Assessment How does the Gramm-Leach-Bliley Act (GLBA) impact information systems security and the need for information systems security practitioners and professionals? If an organization is a financial institution or insurance company that is also publicly traded, what other