SNHU Cyberplaybook Discussion
Submit a screenshot of the item in your cyber playbook that you feel is the most valuable to you (now or in the future) and explain your reasoning.
Note: If you have not yet set up your cyber playbook or if you have questions about its use, refer to the Cyber Playbook page for more information about this required element.
Review this list of artifacts recommended for inclusion and feel free to add additional artifacts from the course you find valuable.
Module Two Activity: Data Protection Case Study |
||
Module Three Activity: Privacy Protection Case Study |
||
Module Four Activity: Role-Based Access Control (RBAC) Matrix |
||
Project Three Milestone: Decision Aid |
Guidelines for Submission: Submit a screenshot and two to three sentences in a Microsoft Word document or the equivalent.
i need these added to my cyberplaybook template, the things i submit. i also need a screenshot of one of those items in the playbook in a word document with 2-3 sentences explaining why
Playbook, workbook, portfolio—regardless of the name, all have a similar purpose in cybersecurity. They are a resource to store or encapsulate knowledge on cybersecurity topics, tactics, and strategies that you will use again and again in the field to deal with situations as they arise. The idea is, you don’t wait until the situation arises to have a plan. You want it in the book. You need it in the book.
Playbooks are becoming more common in the industry. The following are examples of how other people in the industry have set up playbooks to help preserve their knowledge:
Playbooks should not be confused with typical portfolios. This is not something you are preparing for an employer or that you pull out at an interview. It is something that will prepare you before you go on an interview or meet with a key stakeholder about an issue that arises.
The intent of the playbook in this academic program is not only to give you a “base” playbook to start your career but to help you cultivate and develop the ability to transfer your knowledge and skills from this academic program into real-world contexts and develop your adversarial mind-set. Throughout this degree program, you will encounter icons which prompt you to tag or save certain artifacts to your playbook.
The categories of the playbook and their corresponding icons are:
Component Security | Organizational Security | ||
Connection Security | Societal Security | ||
Data Security | Software Security | ||
Human Security | System Security |
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.