Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Please answer Each question, and cite any sources used.

1. Review: Guide for Developing Security Plans for Federal Information Systems By Marianne Swanson and Joan Hash and Pauline Bowen.

How does the the approach of information security implementation, security objective, and potential impact influence the effectiveness and cost management of the task?

2. Question A:

Describe threats and vulnerabilities and how to address them using a business impact analysis. Scenario: You are pen-testing a financial corporation and have found threats and vulnerabilities and need to explain to the business owner what they are. You must also provide an explanation on how a BIA can help the business secure their confidentiality, Integrity and Availability.

Question B:

Research a unique news story or article related to Information Technology. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

3. Question A:

Describe physical and logical access controls when and where would you implement them. Pick a type of physical and logical control i.e. Firewall or CCTV and explain how they work and what type of controls they provide.

Question B:

Research a unique news story or article related to Access controls. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

4. Question A:

Describe the risk management process and explain each step in detail.

Question B:

Research a unique article on Risk Management. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

5. Question A:

Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad.

Question B:

Research a unique article on encryption techniques. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please fully cite you source.

6. Question A:

Describe the OSI model and break down each layer, explaining what functions they perform.

Question B:

Pick an article on The 17 biggest data breaches of the 21st century By Taylor Armerding. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

7. Question A:

Pick two US compliance laws and provide a brief description. Then, provide your thoughts on if the laws need to be updated or changed in any way. Describe how these laws relate to the CIA triad.

Question B:

Research a unique article on compliance laws. Write a short summary of what you learned, and please also provide a link to the original article. The source is your choice; however, please fully cite your source.

8. What is the most practical and easily-applied lesson you learned after answering the previous questions? What was the hardest to grasp? Why?

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93130593
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Management Information System

Dsigning amp implementing zachmans enterprise modelling

Designing & Implementing Zachman's Enterprise Modelling Framework in Multinational Corporate Learning Outcomes: At the end of the assignment. student should be able: • To have an understanding of Zachman's Framework in d ...

Knowledge management systems and crmin answer to the

KNOWLEDGE MANAGEMENT SYSTEMS AND CRM In answer to the challenges Nelnet faces in servicing a growing volume of student loans, the company chose to deploy a knowledge management system called OpenText Process Suite. Go on ...

Distributive bargainingany of the parties involved in the

Distributive Bargaining Any of the parties involved in the negotiation tries to get the maximum advantage by applying the tactics. According to Batra, generally, the negotiation processes are handled by using two approac ...

Assignment erm roadmapthe following material may be useful

Assignment : ERM Roadmap The following material may be useful for the completion of this assignment. You may refer to the documents titled "Embracing Enterprise Risk Management: Practical Approaches for Getting Started" ...

Topicwe all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey a bit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly ...

Legal aspects of healthcare 3-4 sentences for each

Legal Aspects of Healthcare / 3-4 sentences for each question 1. Explain the differences between express and implied consent. Which type is more legally sound? Are express consents given by patients? If so, give an examp ...

Assignment1 you have been asked to help promote a new bill

Assignment 1) You have been asked to help promote a new bill in your state, to which there is much opposition to this bill. Discuss what distributive bargaining is. Discuss the pros and cons which might arise toward the ...

The scenariomusic university has asked you to help them to

The Scenario Music University has asked you to help them to design their student performance data mart. Your requirements elicitation with the clients has determined that they are interested in answering questions such a ...

Describe two examples of a very poorly implemented database

Describe two examples of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might hav ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As