List three security controls that you employ to protect

Assignment Help Computer Engineering
Reference no: EM133244621

Question 1. The compliance approach to ISM, as exemplified by organizations doing the minimum to obtain certification against ISO/IEC 27001, has been widely criticized.

a. Look for such criticism, e.g. on the Internet, and summarize in a paragraph or two some of the main critical arguments.

b. Can you think of possible alternatives to the ISO/IEC 27001 approach?

Question 2. Find and describe an example from the press (or elsewhere) of an organization that has suffered a major security breach

Discuss whether this breach means that the organization has not followed the requirements of ISO/IEC 27001; this will involve thinking about the nature of the breach and

(a) whether the attack could have been anticipated, and (b) whether appropriate controls were used to address the risk(s) related to the attack.

Question 3. identify an organizational scenario to provide context for the remainder of the answer to this question.

Choose one of the security policies;

Access Control, Backup, Information Transfer, Protection from Malware, Cryptographic Control, Communication Security, Privacy and Protection of PII, Physical and Environmental Security), and give two information security risks for this topic area that apply in the identified scenario.

Assessed these risks within the context of the identified scenario, following the three-stage the approach outlined in ISO/IEC 27005, and suggest possible treatments.

Question 4. Choose a personal computing device that you own, e.g. a smartphone, tablet, notebook, or desktop computer, to answer this question. Start your answer by briefly describing the device.

a) List three security controls that you employ to protect this device. In each case indicate which of the standardized control types from ISO/IEC 27002 these controls correspond to.

b) List three other controls that you could have employed but which you have chosen not to, again indicating which of the standardized control types from ISO/IEC 27002 these controls correspond to.

c) For each of the identified controls in your answers to a) and b), briefly discuss what risks these controls address, and, in the case of controls in b), indicate why you have chosen not to address these risks.

Question 5. Describe briefly, a recent security breach affecting a major company that involved a compromise of sensitive data, and explain why you believe it did (or did not) breach European data privacy requirements (e.g. those imposed by GDPR). Please choose a different example to that used to answer question 2.

Reference no: EM133244621

Questions Cloud

How would an organization demonstrate responsible : COM 504 Saint Leo University How would an organization demonstrate responsible stewardship in the collection, maintenance, and distribution of personal
How will this enable you to become a more productive student : How will this enable you to become a more productive student? What measures can you take in order to lower your stress and optimize your health and well being
Show the effect of rsvp on the voice application : IT Technical University of Malaysia, Analyze the graph we obtained in this lab. Show the effect of RSVP on the Voice application and explain the obtained
Benefits of creating and maintaining an information : IT 123 Pennsylvania State University Provides a brief but comprehensive overview of the goals and objectives of the information assurance plan
List three security controls that you employ to protect : Find and describe an example from the press (or elsewhere) of an organization that has suffered a major security breach
Provide a short summary of the main message : The Super Mario Effect - Provide a short summary of the main message and identify which types of support material this speaker(s) used
Report focused on the specific challenges and issues : Write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy
Security breaches threaten patient privacy : CSE Arizona State University, Security breaches threaten patient privacy when confidential health information is made available to others
Develop list that highlight five type of departmentalization : Please develop a list that highlights the five types of departmentalization (Functional, Process, Customer, Product, and Geographic)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design a class to hold a jobbid

Design a class to hold a JobBid. Each JobBid contains a bid number and a quoted price. Each JobBid also contains overloaded extraction and insertion operators.

  Draw the tree graph for tictactoe game

draw the tree/graph for this file (circles as nodes and lines from parents to children). The board positions in the nodes are real. The weights are not what would be in the real game

  How to use the schedule performance index

Use CPI to calculate the estimate at completion (EAC) for this project. Is the project performing better or worse than planned.

  Perform a windows autopilot reset on computer

University of the Fraser Valley perform a Windows Autopilot Reset on Computer1. Which two components are removed after the reset? Select all answers that apply

  Describe the common features of those products

Select a specific category of vertical applications to investigate. Use the Internet and any other sources of information you might have to examine some of the different products that are available in that category.

  Write a client method called bubblesort

Write a client method called bubbleSort which given a list as a parameter uses the bubble sort algorithm to sort the contents of the list.

  Write a simple program to do matrix computations

Write a simple program to do matrix computations. It should commence by inputting two 2 times 2 matrices, then which operation to perform.

  Patent strategy contributing to succes of technology venture

Describe the ways by which an effective patent strategy contributes to success of technology venture? Answer should include at least 300 words. Also include references.

  What is the key ingredient by which the net evolves

Neural Net Evolution. A neural net typically starts out with random. What is the key ingredient by which the net evolves to produce a more accurate prediction?

  How many probes are involved when double hashing is used

About how many probes are involved when double hashing is used to build a table consisting of N equal keys?

  Why legal cyber inquiry into organization would need to made

In 500-750 words, explain why a legal cyber inquiry into an organization would need to be made and the process that would then be followed.

  Is undecided a way to represent the null value

When a student has not selected a major at a university, the university often enters a value of "Undecided" for the major field.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd