Shop

Affordable Care Act

Category:
Description

QUESTION DESCRIPTION

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.


Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. (I don’t work)

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

How all this topics connected to work environment?

  • Three Ways to Start Threat Modeling: Threat modeling focuses on identifying vulnerabilities and possible risks to a system, application, or network, and determining countermeasures to prevent and mitigate the effects of threats. In this perspective, threat modeling may be started through software-centric, attack-centric, or asset-centric approach
  • What does STRIDE stand for?
  • 5 Ways of authenticating a remote machineA device can be validated using an application, CHAP, Shiva PAP, keep off unauthorized people from accessing the device, Extensible Authentication Protocol
  • Threat modelling tools: Microsoft Free SDL threat modelling tool, Securicad by Forseeti, Irius Risk tool.
  • Why each of the below are considered new threats when going to the cloud:Additional insiders, Changing trust boundaries, Legal threats, Compliance
  • Explain in few sentences how each of these heuristics applies to security: Goal orientation (people want to pursue some task which isn’t security), Confirmation bias (people believe they’re right, and search for evidence), Compliance budget (People can only budget a certain amount of time for security)
Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Affordable Care Act”

Your email address will not be published. Required fields are marked *