Introduction to Information Security Management

Dec 9th, 2015
Sigchi4life
Category:
Computer Science
Price: $30 USD

Question description

Question 1:

Learning Objective: Define key characteristics of information security.

Make sure you have completed the reading assignment, which includes Extending the McCumber Cube to Model Network Defense, before posting and responding in this forum.

The McCumber Cube model and Price's extended version of the model can be used to identify gaps in an information security program. That means each of the 27 cells should be analyzed when developing the security program.

Each student should pick TWO cells that have not already been addressed by another student. Describe how the cell can be used to identify specific countermeasures that can be implemented to reach a security goal during a given information state. Simply identifying the cell is not acceptable. For example, consider the cell (availability, storage, policy). That means you should address how to a policy can be used to make sure that our stored data will be available when needed. You could begin your post by saying ... "It is reasonable to expect that the policy to protect payroll information when stored remains available to the appropriate users. The policy should include measures that ..."

There are 27 cells. If you post late, then you may use the same cell as another student so long as you examples are different.

Posting Guidelines:  This assignment requires an Original Posting from you of 2-3 paragraphs answering the weekly question

Question :2 

Personal Information at Risk

Learning Objective: Understand who is responsible for protecting information assets.

Assignment Requirements

Take a close look at the information stored on your personal computer or laptop.  Then address the  following questions in your paper.

  • Do you, at this moment, have information stored there that is critical to your personal life? (Please do not divulge information you are uncomfortable sharing.)
  • Is the information accessible by persons other than yourself?
  • If that information became lost or compromised, what effect would it have on you or your family?
  • What security measures do you have in place to protect that information?

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 1–2 pages (plus a cover sheet)

Question :3


Write a paper describing your thoughts on:

  1. The importance of setting up a firewall and keeping one’s operating system up-to-date.
  2. How to protect against hackers, viruses, Trojan horses, spyware, adware, phishing e-mails, and other high-tech threats.
  3. The importance of maintaining multiple passwords and not sharing personal information.



Note : Please need each question in saperate doucment and with apa format  and ciattions with no plagarism and need original content.

Tutor Answer

(Top Tutor) Daniel C.
(997)
School: Boston College
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
darnay
Dec 5th, 2016
" The best tutor out there!!!! "
dontuwannaknow
Nov 26th, 2016
" Excellent work as always thanks so much "
SjSurvivor143
Nov 13th, 2016
" Thanks for the help. "
ddg82
Nov 4th, 2016
" Thanks, good work "
tinytim47
Oct 21st, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
jestin7
Oct 12th, 2016
" This tutor is great! "
mixedballz
Oct 8th, 2016
" excellent work as always thanks for the help "
lilmoe415
Sep 29th, 2016
" Thank you, Thank you, for top quality work, this is your guy!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1831 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors