information security HW
Each answer should be 1 – 2 pages long.
-
Why is data the most important asset an organization possesses? What other assets in the organization require protection? Describe each asset in detail.
-
What measures can be adopted to deter someone from committing cybercrime? Explain each measure in detail.
-
List and describe in detail the six continuity strategies identified in the text. How does the internet cloud impact these strategies? Give examples.
-
You have been hired as a security consultant for a credit card company. They are concerned about the vulnerability of their security system. Using the hands-on exercises that you have been exposed to in this course, develop a plan for testing the security of the online credit card company. For each step in the plan, describe in detail the tools that you would use.