project2-1mary

If you are new to the IT security field or just want a more accessible (i.e., less technical) news feed, you might want to read the Security sections of The Register®, eWeek.com®, or Computerworld®. The Register’s Security section gives a good synopsis of some of the more important IT security developments in an easy-to-read format.Open a Web browser and go towww.theregister.co.uk/security/Click on an article that interests you.Take a screenshot.Under the Security sectionClick on an article that interests you.Take a screenshot.Under the Security sectionClick on another article that interests you.Take a screenshot.In the Search box, enter “DDoS” and press Enter.Click on an article that interests you.Take a screenshot.Open a Web browser and go tohttps://www.eweek.com/security (Links to an external site.)Click on an article that interests you.Take a screenshot.Open a Web browser and go tohttp://www.computerworld.com/Click on the Topics drop-down menu and select Security.Click on an article that interests you.Take a screenshot.Under the Security sectionClick on an article that interests you.Take a screenshot.Provide a paragraph summary at the top of your Word submittal on why each of these articles interests you and what you think you’ll be able to apply in your current/future cybersecurity position from these articles.Threat Intelligence FeedCreate a threat intelligence RSS feed using a feed-building application of your choosing. Build your threat intelligence feed using numerous reputable sources. Aim to find sources that publish updates at least once daily.Take care to curate your information as it may end up being used in delivering services to real-world clients served by the CFC programs.This entry should contain two parts:(1-page maximum, not including screenshots) Show off your threat-intel feed!Please share any instructions or particulars for viewing and usage of your feed.Share a link to your feed and/or screenshots of your feed in action.Give brief descriptions of each link/screenshot to orient the reader.Discuss why you chose the sources you chose.How may these be beneficial to real-world businesses?Did you focus on any specific industries? Why or why not?(2-page maximum, not including reference page) Identify and discuss a trend.Choose 3 recent (within the last week) pieces of intelligence from your feed to create a business-minded executive report, including:Background summary for each threat: What is the threat?Business relevance: Why is it significant? (Why should the bosses care?)Suggestions for remediation and expected outcomes – how to protect/prevent against this threat and results of remediation/resolution/mitigation actions. (What actions should the business take in light of this information and what outcomes are expected from actions?)This is the next chapter/reference in your lab book for the semester. Each Lab Assignment is a new chapter in your lab book.Your lab book chapter each week should include:Cover PageAbstractIntroduction of the lab assignmentScreenshots that dialogue your lab experience/ what you learnedConclusion of the lab assignmentIndependent Research – expanding the topic. (For example this week, where are other good sources to find more current security information.)References

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support