Number each question as 1, 2, etc. to match with the question number. Use the citation rule. Adequate coverage of a single question (and there is more than one question in this assignment) is possible between 200 and 400 words. Any reference list, diagram, chart, table, etc. included are not counted towards the word limit.

Question 1. Explain five cyber security best practices, and for each one, explain what it is, why it is used, how it is used (not expected to implement but be able to explain), and an example on the context (organization, any security domain) where it can be used. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.

Question 2. Share three cyber security best practices that could be applied to the US government/military. For each, explain what it is, why it should be used, and its application (not expected to implement but be able to explain). I will understand if you include in this answer the best practice(s) that you have noted in question 1. But also try to look at from the unique angle of the US government as its needs could be unique. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.

Question 3. From the global perspective (a corporation that has IT spread across the world, US government/military, and worldwide cyber vigilance), explain three cyber security best practices, what they are, why they should be used, and how to use (not expected to implement but be able to explain).  I will understand if you include in this answer the best practice(s) that you have noted in the above question(s). But also try to look at it from the global perspective and any unique need. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.

Question 4. Explain the importance of monitoring the IT infrastructure, and the expected frequency to monitor depending on the nature of the vulnerability. Provide one example of an IT domain that needs to be monitored with the proposed frequency to monitor. Study two tools of your choice that can be used for cyber security monitoring, Explain what it is, why it should be used, and how to use it (not expected to implement but be able to explain). You can choose a tool found in the course learning resource, or a different tool.

References

At the end of all the answers, list the references used in all the answers using the citation rule (see the course announcement on course protocol which notes the citation rule), and also cite the references in-line within the body of the writing.