Engineering Homework Help

SNHU Cyberplaybook Discussion

 

Submit a screenshot of the item in your cyber playbook that you feel is the most valuable to you (now or in the future) and explain your reasoning.

Note: If you have not yet set up your cyber playbook or if you have questions about its use, refer to the Cyber Playbook page for more information about this required element.

Review this list of artifacts recommended for inclusion and feel free to add additional artifacts from the course you find valuable.

Module Two Activity: Data Protection Case Study

Module Three Activity: Privacy Protection Case Study

Module Four Activity: Role-Based Access Control (RBAC) Matrix

Project Three Milestone: Decision Aid

Guidelines for Submission: Submit a screenshot and two to three sentences in a Microsoft Word document or the equivalent.

i need these added to my cyberplaybook template, the things i submit. i also need a screenshot of one of those items in the playbook in a word document with 2-3 sentences explaining why

Playbook, workbook, portfolio—regardless of the name, all have a similar purpose in cybersecurity. They are a resource to store or encapsulate knowledge on cybersecurity topics, tactics, and strategies that you will use again and again in the field to deal with situations as they arise. The idea is, you don’t wait until the situation arises to have a plan. You want it in the book. You need it in the book.

Playbooks are becoming more common in the industry. The following are examples of how other people in the industry have set up playbooks to help preserve their knowledge:

Playbooks should not be confused with typical portfolios. This is not something you are preparing for an employer or that you pull out at an interview. It is something that will prepare you before you go on an interview or meet with a key stakeholder about an issue that arises.

The intent of the playbook in this academic program is not only to give you a “base” playbook to start your career but to help you cultivate and develop the ability to transfer your knowledge and skills from this academic program into real-world contexts and develop your adversarial mind-set. Throughout this degree program, you will encounter icons which prompt you to tag or save certain artifacts to your playbook.

The categories of the playbook and their corresponding icons are:

CYB Playbook Icons: Component Security Component Security CYB Playbook Icons: Organizational Security Organizational Security
CYB Playbook Icons: Connection Security Connection Security CYB Playbook Icons: Societal Security Societal Security
CYB Playbook Icons: Data Security Data Security CYB Playbook Icons: Software Security Software Security
CYB Playbook Icons: Human Security Human Security CYB Playbook Icons: System Security System Security