SlideShare a Scribd company logo
1 of 4
SEC 402 Cyber Security
Discussion 1
"Managing Data Security" Please respond to the following:
· Imagine you are part of a security policy development team.
Compose four policies that could prevent threats to the
information assets of an organization. Select one policy you
believe would be the best policy for strengthening data security
and explain why.
· Explain how you would factor risk management practices into
the development of the policies you constructed above. Outline
specific measures, processes, and activities in your answer.
Discussion 2
"Applying Forensics Within the Enterprise" Please respond to
the following:
· Distinguish the three most important factors that will protect
and enhance the confidentiality and integrity aspects of data
assets. Provide a rationale for your chosen factors.
· Imagine you are a member of an organization’s forensics
support team. Suppose that the data security countermeasures of
your organization have been breached. Outline possible
activities that you would perform to complete the digital
forensic process. Determine the importance of establishing
routine evaluations of security controls for ensuring consistent
results.
Assignment 1: Developing the Corporate Strategy for
Information Security
Imagine that you are working for a startup technology
organization that has had overnight success. The organization’s
immediate growth requires for it to formulate a corporate
strategy for information security. You have been recruited to
serve as part of a team that will develop this strategy.
As part of the Information Security Strategy development, you
are required to define specific Information Technology Security
roles that will optimize and secure the organization’s data
assets.
Review the following Website titled “Information Technology
(IT) Security Essential Body of Knowledge (EBK): A
Competency and Functional Frame-work for IT Security
Workforce Development” for additional information necessary
to complete this assignment.
Write a five to seven (5-7) page paper in which you do the
following, based on the scenario described below:
1. The Chief Information Security Officer (CISO) is responsible
for several functions within an organization.
a. Examine three (3) specific functions a CISO and provide
examples of when a CISO would execute these functions within
the
organization.
b. Specify at least three (3) competencies that the CISO
could perform using the provided Website titled, “ Information
Technology
(IT) Security Essential Body of Knowledge (EBK): A
Competency and Functional Frame-work for IT Security
Workforce
Development.”
2. The Chief Information Officer (CIO) is responsible for
several accountability functions within an organization:
a. Identify at least four (4) functions of the CIO using the
EBK as a guide. Provide examples of how the CIO would
execute these
functions within an organization.
b. Classify at least two (2) security assurances that could be
achieved by the CIO developing a formal security awareness,
training,
and educational program.
c. Suggest methods, processes, or technologies that can be
used by the CIO to certify the security functions and data assets
of an
organization on a day-to-day basis.
3. Describe how the digital forensics function complements the
overall security efforts of the organization.
4. Evaluate the operational duties of digital forensic personnel
and how these help qualify the integrity of forensic
investigations within the enterprise and industry.
5. List at least three (3) technical resources available to the
digital forensics professional to perform forensic audits and
investigations.
6. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
· Describe and apply the 14 areas of common practice in the
Department of Homeland Security (DHS) Essential Body of
Knowledge.
· Describe best practices in cybersecurity.
· Identify and analyze the role of the Chief Information Officer,
Information Security Officer, and IT Security Compliance
Officer in the context of cybersecurity.
· Compare and contrast the functional roles of an organization
in the context of cybersecurity.
· Describe the corollary roles of security in an enterprise.
· Evaluate the ethical concerns inherent in cybersecurity and
how these concerns affect organizational policies.
· Use technology and information resources to research issues in
cybersecurity.
· Write clearly and concisely about topics associated with
cybersecurity using proper writing mechanics and technical
style conventions.

More Related Content

Similar to SEC 402 Cyber Security Discussion 1 Managing Data Security.docx

The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxteresehearn
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxKomlin1
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comRobinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comGeorgeDixon99
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxjosephinepaterson7611
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmejacvzpline
 
CIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.comCIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.comBartholomew22
 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEWshyamuopuop
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
Cis 560 Education Organization -- snaptutorial.com
Cis 560   Education Organization -- snaptutorial.comCis 560   Education Organization -- snaptutorial.com
Cis 560 Education Organization -- snaptutorial.comDavisMurphyC
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comMcdonaldRyan139
 
CIS 560 Inspiring Innovation/tutorialrank.com
 CIS 560 Inspiring Innovation/tutorialrank.com CIS 560 Inspiring Innovation/tutorialrank.com
CIS 560 Inspiring Innovation/tutorialrank.comjonhson114
 

Similar to SEC 402 Cyber Security Discussion 1 Managing Data Security.docx (20)

The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignme
 
CIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.comCIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.com
 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEW
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
Cis 560 Education Organization -- snaptutorial.com
Cis 560   Education Organization -- snaptutorial.comCis 560   Education Organization -- snaptutorial.com
Cis 560 Education Organization -- snaptutorial.com
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.com
 
CIS 560 Inspiring Innovation/tutorialrank.com
 CIS 560 Inspiring Innovation/tutorialrank.com CIS 560 Inspiring Innovation/tutorialrank.com
CIS 560 Inspiring Innovation/tutorialrank.com
 

More from kenjordan97598

You are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docxYou are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docxkenjordan97598
 
You are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docxYou are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docxkenjordan97598
 
You are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docxYou are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docxkenjordan97598
 
You are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docxYou are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docxkenjordan97598
 
You are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docxYou are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docxkenjordan97598
 
You are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docxYou are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docxkenjordan97598
 
You are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docxYou are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docxkenjordan97598
 
You are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docxYou are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docxkenjordan97598
 
You are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docxYou are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docxkenjordan97598
 
You are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docxYou are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docxkenjordan97598
 
You are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docxYou are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docxkenjordan97598
 
You are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docxYou are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docxkenjordan97598
 
You are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docxYou are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docxkenjordan97598
 
You are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docxYou are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docxkenjordan97598
 
You are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docxYou are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docxkenjordan97598
 
You are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docxYou are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docxkenjordan97598
 
You are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docxYou are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docxkenjordan97598
 
You are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docxYou are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docxkenjordan97598
 
You are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docxYou are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docxkenjordan97598
 
You are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docxYou are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docxkenjordan97598
 

More from kenjordan97598 (20)

You are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docxYou are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docx
 
You are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docxYou are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docx
 
You are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docxYou are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docx
 
You are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docxYou are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docx
 
You are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docxYou are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docx
 
You are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docxYou are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docx
 
You are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docxYou are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docx
 
You are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docxYou are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docx
 
You are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docxYou are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docx
 
You are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docxYou are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docx
 
You are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docxYou are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docx
 
You are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docxYou are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docx
 
You are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docxYou are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docx
 
You are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docxYou are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docx
 
You are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docxYou are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docx
 
You are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docxYou are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docx
 
You are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docxYou are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docx
 
You are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docxYou are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docx
 
You are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docxYou are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docx
 
You are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docxYou are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docx
 

Recently uploaded

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

SEC 402 Cyber Security Discussion 1 Managing Data Security.docx

  • 1. SEC 402 Cyber Security Discussion 1 "Managing Data Security" Please respond to the following: · Imagine you are part of a security policy development team. Compose four policies that could prevent threats to the information assets of an organization. Select one policy you believe would be the best policy for strengthening data security and explain why. · Explain how you would factor risk management practices into the development of the policies you constructed above. Outline specific measures, processes, and activities in your answer. Discussion 2 "Applying Forensics Within the Enterprise" Please respond to the following: · Distinguish the three most important factors that will protect and enhance the confidentiality and integrity aspects of data assets. Provide a rationale for your chosen factors. · Imagine you are a member of an organization’s forensics support team. Suppose that the data security countermeasures of your organization have been breached. Outline possible activities that you would perform to complete the digital forensic process. Determine the importance of establishing routine evaluations of security controls for ensuring consistent results. Assignment 1: Developing the Corporate Strategy for Information Security
  • 2. Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy. As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets. Review the following Website titled “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development” for additional information necessary to complete this assignment. Write a five to seven (5-7) page paper in which you do the following, based on the scenario described below: 1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization. a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “ Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” 2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization: a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization.
  • 3. b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. 3. Describe how the digital forensics function complements the overall security efforts of the organization. 4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. 5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. 6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: · Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. · Describe best practices in cybersecurity.
  • 4. · Identify and analyze the role of the Chief Information Officer, Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity. · Compare and contrast the functional roles of an organization in the context of cybersecurity. · Describe the corollary roles of security in an enterprise. · Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies. · Use technology and information resources to research issues in cybersecurity. · Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.