information security HW

Each answer should be 1 – 2 pages long.

 

  1. Why is data the most important asset an organization possesses? What other assets in the organization require protection? Describe each asset in detail.

  2. What measures can be adopted to deter someone from committing cybercrime? Explain each measure in detail.

  3. List and describe in detail the six continuity strategies identified in the text. How does the internet cloud impact these strategies? Give examples.

  4. You have been hired as a security consultant for a credit card company. They are concerned about the vulnerability of their security system. Using the hands-on exercises that you have been exposed to in this course, develop a plan for testing the security of the online credit card company. For each step in the plan, describe in detail the tools that you would use.