Short answer

User Generated

Obreobry

Computer Science

SECR 5080

Webster University

Description

five short essay questions

QUESTION #1: You have just launched a comprehensive corporate security awareness program. Your first step is to provide a security awareness workshop to all employees (management and staff). Your experience as a security manager tells you that bringing all management and staff in a single workshop of this kind may lead to a poor attendance in the workshop. Since this workshop in not mandatory the staff members may have little or no incentive to participate in the workshop Your task is to write a very persuasive news release for all participants (management and staff) to sell the security to stakeholders, provide strategic value of workshop, and encourage employees to attend the workshop. The news release would be short, effective, clear, concise, and drafted for all levels of employees. Therefore, your answer would be a small enough that all would read. It is expected that employees may not even read long news release with ineffective language and arguments. Budget for this event is not your concern and you have support from top levels of management. .

QUESTION 2: Discuss and explain why it is impossible to attain an acceptable level of security for Information Systems by using only technology. Your discussion should highlight the essential elements that should accompany technology.

QUESTION #3: List factors that must be considered in developing overall Corporate Information System Security Policy. Make sure you include the factors that you consider critical in success of a good policy.

QUESTION #4 You are in a large organization and have been tasked to hire a manager for your Information Systems Security department. List the qualifications and skills that you would look for this position. Use categories of “Mandatory” and “Desirable” in your answer. Give a short justification for each of the items in the “Mandatory” column.

QUESTION 5. Your help desk just notified you that several computers in the Accounting Department are having issues that are similar to some type of virus or other malicious attack. The help desk has run an antivirus scan on one of the computers and no malicious software or virus was found. As the help desk is reporting this to you, they added that in the past minute they have two more calls with the same problem except this time it is from the Sales Department. You are the Information Systems Security Manager List step by step actions you would take.

Unformatted Attachment Preview

five short essay questions QUESTION #1: You have just launched a comprehensive corporate security awareness program. Your first step is to provide a security awareness workshop to all employees (management and staff). Your experience as a security manager tells you that bringing all management and staff in a single workshop of this kind may lead to a poor attendance in the workshop. Since this workshop in not mandatory the staff members may have little or no incentive to participate in the workshop Your task is to write a very persuasive news release for all participants (management and staff) to sell the security to stakeholders, provide strategic value of workshop, and encourage employees to attend the workshop. The news release would be short, effective, clear, concise, and drafted for all levels of employees. Therefore, your answer would be a small enough that all would read. It is expected that employees may not even read long news release with ineffective language and arguments. Budget for this event is not your concern and you have support from top levels of management. . QUESTION 2: Discuss and explain why it is impossible to attain an acceptable level of security for Information Systems by using only technology. Your discussion should highlight the essential elements that should accompany technology. QUESTION #3: List factors that must be considered in developing overall Corporate Information System Security Policy. Make sure you include the factors that you consider critical in success of a good policy. QUESTION #4 You are in a large organization and have been tasked to hire a manager for your Information Systems Security department. List the qualifications and skills that you would look for this position. Use categories of “Mandatory” and “Desirable” in your answer. Give a short justification for each of the items in the “Mandatory” column. 5. QUESTION 5. Your help desk just notified you that several computers in the Accounting Department are having issues that are similar to some type of virus or other malicious attack. The help desk has run an antivirus scan on one of the computers and no malicious software or virus was found. As the help desk is reporting this to you, they added that in the past minute they have two more calls with the same problem except this time it is from the Sales Department. You are the Information Systems Security Manager List step by step actions you would take.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hiincase of any issues lemme know

Last Name 1
Your Name
Instructor Name
Course Number
Date
Five Short Essay Questions
Question 1
After an observation on the risks brought about by lack or inadequate security awareness that
include both institutional and personal losses. A workshop is thus being held, and only those who
will attend will know how to combat these security risk. For the security interests of management
and staff, we have elected upon conducting the workshop. The risk of failure to update his
security option is one of the topics to be discussed on the day. Investing your time to this one day
could end up saving most of you hindrances in your working for a lifetime, avail yourself and get
informed on the updated security options. The time, date, and venue for this awareness are
indicted in the company memo.
Question 2
Technical solutions such as antiviruses, firewalls, or intruder detection are not the total solution
for the protection of information from small business to conglomerates. For both external and
internal threats, there must be procedural and administrative processes. Some threats,
vulnerabilities, risks, or expo...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags