The notes enumerate several information system assets while

Assignment Help Other Subject
Reference no: EM13463419

Write the questions followed by your answers.

Describe why having an information security strategy is important for an organization.

List four (4) items with descriptions that should be part of a security strategy.

A key part of a security strategy is to include sub-strategies for dealing with various aspects of security incidents. For example; depending on the security incident there should be policies and procedures defined for: 1) incident prevention, 2) incident detection, 3) incident response 4) incident recovery. The lecture notes described this using the example of repeated entry of incorrect passwords.

Select a particular type of security incident and describe a process or procedure that illustrates addressing each of the four (4) areas.

What is the purpose of performing an asset classification or asset assessment as part of the security strategy?

There are many other very good security resources on the web that publish information on various security topics. Find three (3) websites and describe what each of them offers. Include the url with your description. Include the information here and also place it in the discussion board under the designated topic.

The notes enumerate several information system assets. While these assets are important to an organization they are not the most important assets to a company or organization. What do you consider to be the top two (2) assets to an organization? Note that the information assets enumerated in the notes are NOT the correct answers to this problem. This question is asking for the most important assets, which means they may extend beyond the notion of information assets. Explain your reasoning for the assets you have selected.

In the notes there were two graphs presented from the CERT on incidents reported and vulnerabilities reported. Keep in mind the difference between an incident and vulnerability. Good answers will provide facts and references that go beyond anecdotal information.

What reasons can you provide for the general upwards trend in the number of incidents reported? You should provide at least four (4) reasons with supporting data and reasoned arguments to support your answer.

  1. Define what a security incident is.
  2. Define what a security vulnerability is.
  3. Define what a zero-day vulnerability.
  4. Why can an exploit of a zero-day vulnerability be particularly devastating?

Reference no: EM13463419

Questions Cloud

Describe the complexities of auditing a cloud computing : 1. explain the role auditing plays in the context of achieving trustworthy systems. 2. explain the complexities of
How did early health care applications differ from those : how did early health care applications differ from those available today? how might the current applications be
How has the role of technology changed in the health care : how has the role of technology changed in the health care environment? what does this look like in todays practice?no
Find out positive and negative impact of peers and changes : prepare a 950- to 1150-word paper in which you describe changes that occur during middle childhood and adolescence
The notes enumerate several information system assets while : write the questions followed by your answers.describe why having an information security strategy is important for an
Nbspif the us government were interested in increasing : the short paper needs to be 3 pages double spaced and must include 2 references. nbspthe blog post must be 1 page and
This longer written project is designed to give you the : this longer written project is designed to give you the opportunity to select an electronic health record identifying
Review the literature and examine the strengths and : cloud computing and virtualization are two relatively new technologies which have re-emerged and which are both making
Write a critical essay on the amazon basin in which you : write a critical essay on the amazon basin in which you compare and contrast peter matthiessens the cloud forest and

Reviews

Write a Review

Other Subject Questions & Answers

  Public and private healthcare systems

Write a one page essay comparing and contrasting the public and private healthcare systems in the United States.

  Artist might choose to re-paint a painting

Explain why you think an artist might choose to re-paint a painting into his or her work. In what ways is it the same painting? In what ways does it become different?

  Create a planning strategy for the persuasive speech based

develop a planning strategy for your persuasive speech based on the following five criteria for an effective speechneed

  Principle of good samaritan laws

Critically discuss the principle of Good Samaritan laws. Discuss one way that you believe such laws are beneficial to society and one way that you believe they are detrimental to society.

  Confirming evidence trap

The confirming evidence trap is certainly something to be respected. However, getting stuck to deeply on any trap can lead to inaction for any problem. Inaction can result in the status quo problem which is not a good option.

  Identifying your path in life

As a college graduate how can utilize Stedman's message that he trying to convey in his book toward life presently and also into the future?

  Fewer runway incursions will occur

At a major airport, over 1000 planes land each day on their runways. This steady stream of air traffic has created complexities and delays in landing and departing planes. At any given moment, the airport managers estimate that there is a 1% chance o..

  Inquisitors interrogation of veronese

Do you agree with the Inquisitor’s interrogation of Veronese about his painting, originally titled Last Supper? Or, do you side with Veronese? Explain your response.

  Analyze freud psycho-dynamic theory in terms of his views

Can you analyze Freud's psycho-dynamic theory in terms of his views of unconscious mind, structure of personality, and defence mechanisms. When are se defences useful, and when are they detrimental.

  Explain the similarities and differences in your two

write an ethics paper about it including all the following information and analysis1. solve the dilemma using any two

  Personal protection agent and what is bioterrorism

What are appropriate responses for criminal activity by a personal protection agent (PPA)? Why is it important for the PPA to know disaster medical procedures? What is bioterrorism?

  Kind of touching is appropriate for business relationships

Touching has been found to be helpful in building rapport. What touching or kind of touching is appropriate for business relationships. What do you expect?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd