Describe threats and vulnerabilities

Assignment Help Management Information Sys
Reference no: EM132143128

Please answer Each question, and cite any sources used.

1. Review: Guide for Developing Security Plans for Federal Information Systems By Marianne Swanson and Joan Hash and Pauline Bowen.

How does the the approach of information security implementation, security objective, and potential impact influence the effectiveness and cost management of the task?

2. Question A:

Describe threats and vulnerabilities and how to address them using a business impact analysis. Scenario: You are pen-testing a financial corporation and have found threats and vulnerabilities and need to explain to the business owner what they are. You must also provide an explanation on how a BIA can help the business secure their confidentiality, Integrity and Availability.

Question B:

Research a unique news story or article related to Information Technology. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

3. Question A:

Describe physical and logical access controls when and where would you implement them. Pick a type of physical and logical control i.e. Firewall or CCTV and explain how they work and what type of controls they provide.

Question B:

Research a unique news story or article related to Access controls. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

4. Question A:

Describe the risk management process and explain each step in detail.

Question B:

Research a unique article on Risk Management. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

5. Question A:

Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad.

Question B:

Research a unique article on encryption techniques. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please fully cite you source.

6. Question A:

Describe the OSI model and break down each layer, explaining what functions they perform.

Question B:

Pick an article on The 17 biggest data breaches of the 21st century By Taylor Armerding. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

7. Question A:

Pick two US compliance laws and provide a brief description. Then, provide your thoughts on if the laws need to be updated or changed in any way. Describe how these laws relate to the CIA triad.

Question B:

Research a unique article on compliance laws. Write a short summary of what you learned, and please also provide a link to the original article. The source is your choice; however, please fully cite your source.

8. What is the most practical and easily-applied lesson you learned after answering the previous questions? What was the hardest to grasp? Why?

Reference no: EM132143128

Questions Cloud

Examine a code of ethics for a professional organization : Examine a code of ethics for a professional organization, business, or government agency, and write a critique of it.
Explain what is meant by sufficiency of the consideration : Explain what is meant by the "sufficiency of the consideration". Make sure to provide examples of what would not be sufficient consideration, and why.
Debit that withdraws money from an account : Modify class Account to provide a method called debit that withdraws money from an Account. Ensure that the debit amount does not exceed the Account's balance.
What percent safety margin of stock is being carried : What percent safety margin of stock is being carried?
Describe threats and vulnerabilities : Describe threats and vulnerabilities and how to address them using a business impact analysis.
How you would correct the issue : One criticism of electronic ballots for elections is that while intuitive for younger voters who are familiar with using a mouse to point and click.
All organizations are quick to adopt these methods : Given the benefits of Continuous Improvement techniques like Six Sigma and Lean, why is it that not all organizations are quick to adopt these methods?
What did you learn about organizational leadership : What did you learn about organizational leadership that you did not know prior to taking the course?
Evaluate interface design models : Evaluate interface design models and describe design issues across human-computer interaction environments associated with these models. Support your response.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why should hci professionals keep abreast of those projects

Contrast IBM projects with other competitors developing similar HCI projects. Why should HCI professionals keep abreast of those projects?

  Review several crm vendor sites to gain an understanding

Search the Internet for Web sites and articles about customer relationship management (CRM). Review several CRM vendor sites to gain an understanding of current products on the market and their benefits to marketers.

  Explain the method of security control and the channel

The overarching goal of the Information Assurance and Security organization is to protect the company's electronic, physical, intangible, and people assets. You are the IAS analyst for XYZ company and have been tasked to develop and communicate a ..

  Explain how companies can use information technology

Explain how companies can use Information Technology to make their businesses more competitive. Provide at least 1 or 2 examples and explain how they help.

  Computing problems digipos faced with system upgrades

Examine and assess the main computing problems Digipos faced with regard to system upgrades. Evaluate the solutions that Digipos used to resolve the problem. Propose an alternative solution that you believe could resolve the problem

  Choose to conduct a project that is technical

Choose to conduct a project that is technical (i.e. practically based e.g. development of a prototype, simulation, design framework etc) that fall withincomputing and IT curriculum.

  What are the efficiency savings of the proposed layout

What are the efficiency savings of the proposed layout? - What is the cost of the proposed layout? - In how many years can the cost of the new layout be recovered?

  Analyze what are advantages and disadvantage of social media

Analyze What are advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media?

  Discuss the potential shortcomings and repercussions

Consider an organization in a specific industry (e.g., healthcare, financial, etc.), and discuss the potential shortcomings and repercussions if an organization in this sector neglected to participate in contingency planning efforts

  Ethics in information management

Discuss what you learned from those articles. In your discussion, give example(s) of your organization handles ethic concerns.

  Aircraft solutions

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features.

  Provide secure means of customer purchase and payment

Reduce the operating cost from 28 to 16 percent in two to three years by using an automated system for buying and selling. Provide secure means of customer purchase and payment over Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd