List three security controls that you employ to protect

Assignment Help Computer Engineering
Reference no: EM133244621

Question 1. The compliance approach to ISM, as exemplified by organizations doing the minimum to obtain certification against ISO/IEC 27001, has been widely criticized.

a. Look for such criticism, e.g. on the Internet, and summarize in a paragraph or two some of the main critical arguments.

b. Can you think of possible alternatives to the ISO/IEC 27001 approach?

Question 2. Find and describe an example from the press (or elsewhere) of an organization that has suffered a major security breach

Discuss whether this breach means that the organization has not followed the requirements of ISO/IEC 27001; this will involve thinking about the nature of the breach and

(a) whether the attack could have been anticipated, and (b) whether appropriate controls were used to address the risk(s) related to the attack.

Question 3. identify an organizational scenario to provide context for the remainder of the answer to this question.

Choose one of the security policies;

Access Control, Backup, Information Transfer, Protection from Malware, Cryptographic Control, Communication Security, Privacy and Protection of PII, Physical and Environmental Security), and give two information security risks for this topic area that apply in the identified scenario.

Assessed these risks within the context of the identified scenario, following the three-stage the approach outlined in ISO/IEC 27005, and suggest possible treatments.

Question 4. Choose a personal computing device that you own, e.g. a smartphone, tablet, notebook, or desktop computer, to answer this question. Start your answer by briefly describing the device.

a) List three security controls that you employ to protect this device. In each case indicate which of the standardized control types from ISO/IEC 27002 these controls correspond to.

b) List three other controls that you could have employed but which you have chosen not to, again indicating which of the standardized control types from ISO/IEC 27002 these controls correspond to.

c) For each of the identified controls in your answers to a) and b), briefly discuss what risks these controls address, and, in the case of controls in b), indicate why you have chosen not to address these risks.

Question 5. Describe briefly, a recent security breach affecting a major company that involved a compromise of sensitive data, and explain why you believe it did (or did not) breach European data privacy requirements (e.g. those imposed by GDPR). Please choose a different example to that used to answer question 2.

Reference no: EM133244621

Questions Cloud

How would an organization demonstrate responsible : COM 504 Saint Leo University How would an organization demonstrate responsible stewardship in the collection, maintenance, and distribution of personal
How will this enable you to become a more productive student : How will this enable you to become a more productive student? What measures can you take in order to lower your stress and optimize your health and well being
Show the effect of rsvp on the voice application : IT Technical University of Malaysia, Analyze the graph we obtained in this lab. Show the effect of RSVP on the Voice application and explain the obtained
Benefits of creating and maintaining an information : IT 123 Pennsylvania State University Provides a brief but comprehensive overview of the goals and objectives of the information assurance plan
List three security controls that you employ to protect : Find and describe an example from the press (or elsewhere) of an organization that has suffered a major security breach
Provide a short summary of the main message : The Super Mario Effect - Provide a short summary of the main message and identify which types of support material this speaker(s) used
Report focused on the specific challenges and issues : Write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy
Security breaches threaten patient privacy : CSE Arizona State University, Security breaches threaten patient privacy when confidential health information is made available to others
Develop list that highlight five type of departmentalization : Please develop a list that highlights the five types of departmentalization (Functional, Process, Customer, Product, and Geographic)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd