17 Jan Building Security Awareness
Given the many security threats to information and infrastructure discussed in Module 2 you will analyze the prevalence of these threats in the United States. Analysis of each of these threats in terms of organizations and government entities is a key topic in this country, not only to secure trade secrets and operations in organizations, but to secure the democratic government at the national and state levels.
Module 2 Video
Assignment Expectations
Using the types of security threats discussed in Module 2, review the trade journals, newspapers, and other sources on the Internet to discuss the prevalence of these attacks on organizations and government entities in the United States.
This will be graded in terms of the number of attacks uncovered and the firms/government agencies targeted. You need to provide references for each attack and discuss the impact of that attack.
You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the Trident APA 7 Guide at https://careered.libguides.com/tui/library/apa for proper formatting and style.
Module 2 – Resources
Building Security Awareness
Required Reading
Required Reading
(2022). Cybersecurity Awareness: Getting Started with Security Foundations. Finding Skillsoft Books (This is a course that you will launch.)
Carey, M.J. and Jin, J. (2020). Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership. John Wiley & Sons. Read any 5 chapters in this book. Finding Skillsoft Books
Sohaib, M. (2021). Ethical Hacker’s Certification Guide (CEHv11), BPB Publications. Chapters 4 and 5. Finding Skillsoft Books
Welcome to threat hunting from LinkedIn Learnig. Please note that this link will open in a new window and may require activation of a LinkedIn account on the first attempt. Trident students may use their student email address to access this free subscription to LinkedIn Learning as a part of this course.
Optional Reading
Harris, S., & Maymi, F. (2018). CISSP all-in-one exam guide, seventh edition, 8th edition (7th ed.) McGraw-Hill, Chapter 2. Finding Skillsoft Books
Read Chapter 1 Risk management for enterprises and individuals (2017) Book under Creative Commons
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.