"IT Security" Please respond to the following:
1.From the e-Activity, discuss how the National Security
Telecommunications and Information Systems Security Policy
(NSTISSP) national policies facilitate the confidentiality,
integrity, authentication, and non-repudiation of computing
security.
2.Analyze the elements of vulnerability and threat (physical,
procedural, policy, etc.) that exist in an IS or
telecommunications system. Suggest corresponding protection
measures.
"IT Influence" Please respond to the following:
3.The Payment Card Industry Data Security Standard (PCI DSS)
is used by credit card companies to ensure the safety of the
customer data. Assume that you are amerchant. Determine the
advantages and disadvantages of adopting the PCI DSS
standard.
4.Suggest methods that organizations could implement to
prevent the A1-Injection(Structured Query Language (SQL)
Injection) and A2-Cross Site Scripting (XSS)in software
applications.
Bottom of Form

IT Security Please respond to the following1.From the e-Act.docx

  • 1.
    "IT Security" Pleaserespond to the following: 1.From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security. 2.Analyze the elements of vulnerability and threat (physical, procedural, policy, etc.) that exist in an IS or telecommunications system. Suggest corresponding protection measures. "IT Influence" Please respond to the following: 3.The Payment Card Industry Data Security Standard (PCI DSS) is used by credit card companies to ensure the safety of the customer data. Assume that you are amerchant. Determine the advantages and disadvantages of adopting the PCI DSS standard. 4.Suggest methods that organizations could implement to prevent the A1-Injection(Structured Query Language (SQL) Injection) and A2-Cross Site Scripting (XSS)in software applications. Bottom of Form