$30.00 WHOLE CLASS ALL WEEKS DQ Discussion Questions CMGT 441 CMGT/441 Version 3 Introduction to Information Systems SecurityFound in Computer-Science: General-CS
Chapter 1, # 0
WHOLE CLASS ALL WEEKS DQ Discussion Questions CMGT 441 CMGT/441 Version 3 Introduction to Information Systems Security
Week 1 Discussion Questions DQ1:293 Words DQ 2:336 Words CMGT/441 CMGT 441 Version 3 Introduction to Information Systems Security v3
Based on the Barr (2011) article, how will merging information technologies such as data center virtualization impact business continuity for websites? Will cloud computing or platform as a service (PaaS) that provides dynamic scalability with enhanced infrastructure security ensure business continuity for websites or is this just a new unproven panacea?
Discuss what makes a successful information security awareness program and how a security awareness program can be one of an organization’s most powerful protection strategies.
Week 2 Discussion Questions DQ1:301 Words DQ 2:372 Words CMGT/441 CMGT 441 Version 3 Introduction to Information Systems Security v3
Why is managing technical vulnerabilities so important to an organization managing their security environment?
Based on the Barr (2011) article, why is identity management considered the central component of access management and security strategies? Should identity management focus on role-based access control (RBAC)? What has the greatest positive impact on enterprise data protection (EDP), identity management, or encryption?
Week 3 Discussion Questions DQ 1:309 Words DQ 2:380 Words CMGT/441 CMGT 441 Version 3 Introduction to Information Systems Security v3
Discuss the principles and challenges associated with continuous data protection. Does your organization have a CDP plan? Why or why not?
Based on the Spring (2009) article, do you think security event management (SEM), such as the IBM Tivoli products, is feasible for small- to medium-sized businesses (SMBs)? Will SEM push SMBs to SaaS to gain an acceptable cost/benefit justification?
Week 4 Discussion Questions DQ 1:383 Words DQ 2:308 Words CMGT/441 CMGT 441 Version 3 Introduction to Information Systems Security v3
As hackers keep thinking of new ways to attack systems, what are some of the tools and techniques that experts believe will keep government on the cutting edge of security?
Based on the Barr (2011) article, how does the common criteria standardized, global set of IT security specifications impact EDP? How does the common criteria address end-to-end data encryption throughout the information life cycle (ILM) of the data?
Week 5 Discussion Questions DQ 1:538 Words DQ 2:234 Words CMGT/441 CMGT 441 Version 3 Introduction to Information Systems Security v3
What are some of the challenges facing companies when trying to implement wireless security? How does this affect their security frameworks?
What metrics are used within your organization to monitor and report on organizational security?
- This tutorial was purchased 8 times and rated No Rating by students like you.
- Posted on Jul 20, 2012 at 1:49:57PM
Week 1/WK 1 DQ 1 _ 293 Words.docx
Week 1/WK 1 DQ 2 _ 336 Words.docx
Week 2/WK 2 DQ 1 _ 301 Words.docx
Week 2/WK 2 DQ 2 _ 372 Words.docx
Week 3/WK 3 DQ 1 _ 380 Words.docx
Week 3/WK 3 DQ 2 _ 309 Words.docx
Week 4/WK 4 DQ 1 _ 383 Words.docx
Week 4/WK 4 DQ 2 _ 308 Words.docx
Week 5/WK 5 DQ 1 _ 538 Words.docx
Week 5/WK 5 DQ 2 _ 284 Words.docx