1-3 CYB 200 SNHU

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by jdogcoble

Report
Security Objective Mapping Topic Category Justification Source Ensure all computers you use, or control have an up-to-date, supported antivirus software installed. Integrity “When properly deployed and up-to- date, antivirus software is an important part of a defensein-depth strategy to guard against malicious software (malware) in industrial control systems” Recommended practice updating antivirus in an industrial control system . cisa.gov. (2018, August 2). https://www.cis a.gov/sites/defa ult/files/recom mended_practic es/Recommend ed%20Practice %20Updating %20Antivirus %20in%20an %20Industrial %20Control %20System_S5 08C.pdf Check your browser history (weekly). Integrity Reviewing your browser history for suspicious activity ensures that the system is not compromised. Prakash, M. (n.d.). CIA Triad in cyber security: Definition, examples, importance . What is CIA Triad in Cyber Security? https://www.kn owledgehut.co m/blog/security /cia-in-cyber- security#examp les-of-the-cia- triad-in- practice- %C2%A0 Run a complete scan of your system using the anti-virus and anti-spyware Integrity Scans can detect and remove malware that can alter or corrupt your data. This prevents Allen, J. (2020, August 6). 5 reasons you should run an antivirus scan
software applications (weekly). unauthorized modifications and ensures the integrity of your files and system settings. Scans can also identify and remove rootkits and other advanced threats that can compromise your system's security and integrity. at least once each week . Windows Central. https://www.wi ndowscentral.c om/5-reasons- you-should- run-antivirus- scan-least- once-each- week#:~:text= Antivirus %20software %20updates %20regularly %20via,picked %20up%20on %20the %20issue. When off campus, access Purdue directories only through VPN. Availability When off campus and using a VPN gives you access to Purdue directories with a secure connection. Chowdhary, K. (2023, September 22). The benefits of using a VPN for remote work and business . Tom’s Guide. https://www.to msguide.com/fe atures/the- benefits-of- using-a-vpn- for-remote- work-and- business If possible, close and lock your office door when leaving your computer. Availability This is a physical barrier that prevents anyone without a key to access your computer. Manually locking your computer screen . Manually Locking Your Computer Screen | Technology Services. (n.d.). https://it.tufts.e
du/guides/manu ally-locking- your-computer- screen/ manually- locking-your- computer- screen Lock your keyboard when you step away from your computer for even a moment. Availability When you step away from your computer after locking the keyboard this still allows you access but prevent unauthorized people access. Manually locking your computer screen . Manually Locking Your Computer Screen | Technology Services. (n.d.). https://it.tufts.e du/guides/manu ally-locking- your-computer- screen/ manually- locking-your- computer- screen Turn on your operating system's firewall. Confidentiality Turning on the operating system’s firewall blocks unauthorized access; firewalls help protect sensitive information from being intercepted or stolen. Hashemi-Pour, C., & Chai, W. (2023, December 21). What is the CIA triad?: Definition from TechTarget . WhatIs. https://www.tec htarget.com/wh atis/definition/ Confidentiality- integrity-and- availability- CIA Change your password every 120 days Confidentiality Regularly changing passwords reduces the potential harm if a Phillips, E. (n.d.). Benefits of changing your
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
password is compromised. Attackers have less time to exploit the stolen password before it becomes invalid. This protects sensitive information and systems accessed through those accounts. password regularly . footer_bg_trans parent_2-03. https://www.pr oactive- info.com/blog/c hange-your- password Always use strong passwords and keep them secret. Confidentiality Strong passwords, being difficult to guess or crack, act as a gatekeeper to your information and systems. Keeping them secret prevents unauthorized access to confidential data like financial records, personal information, or critical documents. Phillips, E. (n.d.). Benefits of changing your password regularly . footer_bg_trans parent_2-03. https://www.pr oactive- info.com/blog/c hange-your- password Do not set your computer to automatically log in. Confidentiality If you have automatic log in enabled that would allow anyone to have access to your computer. Newsroom, Ps. (2022, April 28). Why you should avoid using auto- login for your accounts . PSafe Blog. https://www.ps afe.com/en/blog /why-you- should-avoid- using-auto- login-for-your- accounts/