Reference no: EM132566036
Information systems
Topic 6.1: Public Data Implications
Explain a situation where non-classified or public data could be used against an organization.
Topic 6.2: User Auditing
Develop a policy for auditing and monitoring company users. What are some important things to monitor about users and company resources? If someone gets denied access to resources why is it important for the security management to be notified?
Topic 7.1: Security Controls
Which security controls do you consider the most important? Have you ever observed or heard of a security control in action?
Topic 7.2: Incident Planning
What are the steps involved in responding to an organizational security incident? Which of these steps are the most important? Which steps need to be taken in advance of a security incident?
Topic 8.1: Lessons Learned
Discuss lessons learned in disaster recovery from the terrorist attacks on 9-11. What changes were made going forward to what government agencies?
Topic 8.2: Continuity Planning
There are four main steps of the BCP process. Briefly describe each step. Next, select one step of the plan you would like to develop. Why is this step important and why did you select it? What is handled in this step?
Topic 9.1: Impact of Regulations
SOX, GLBA, HIPAA and Dodd-Frank are examples of government regulations that impact today's businesses. Choose one of and explain it. What are some of the unintended consequences of the mandate you picked? What was the original goal of the mandate? Was it successful in achieving that goal?
Topic 9.2: Ethics
Read the ISC^2 code of ethics. Which part of it do you think is the most important? Which part do you think is the most violated?
Topic 10.1: Security Trends
What do you think are the main trends in information security? What impact do you think they will have on security policies and regulations?
Topic 10.2: Ubiquitous data
What impact do you think ubiquitous computing will have on security? How about increased computing power with breakthroughs like quantum computing?