Lesson 5 Discussion Question 1

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

PLEASE PUT IN SEPARATE DOCUMENTS (doesn’t need to be original none of these will be checked through any turnitin or plagiarism checker so i don’t care you copy and paste just make sure you are answering thoroughly

2 COMPLETE PARAGRAPHS

Lesson 5 Discussion Question 1

Instructions:

Step 1: Respond to the following:

Physical Security Attacks in the Workplace

In this lesson, you explored what to expect in terms of security as an employee in the workplace. Throughout this course, you learned about different types of cybercrime and how to protect yourself from them. Physical security cannot be overlooked. Visit the Computerworld website. Search the site for “Physical Security. Read the article “Physical security: The overlooked domain” by Robert C. Covington.

Think of a place where you have worked. (Alternatively, you can think of a place where someone you know well works or has worked.) Regardless of the type of job you had, what information did you have access to? Do you believe that an insider could have caused the biggest threat at that place of employment? Why or why not? Think of the physical threats listed in the article and reflect on the company you are thinking of. Did the company have any of these threats (open lobby, poorly secured doors, etc.)?

2 COMPLETE PARAGRAPHS

Lesson 5 Discussion Question 2

Instructions:

Step 1: Respond to the following:

Computer Forensics

Many people believe real computer forensics are exactly like what they see on hit TV shows such as CSI. Visit the TechRepublic website. Read the article called “So you want to be a computer forensics expert” by Deb Shinder, and answer the following questions.

  • Did your idea of computer forensics change after reading this article and the textbook? Why or why not?
  • Why do you believe computer forensics is important?
  • Do you believe anyone can do the job if they have good software toolkit? Why or why not?
  • Can the steps of a computer forensics investigation vary depending on the situation? Why or why not?

Lesson 5 Essay Assignment

Instructions: It is essential for organizations to have plans and procedures in place in order to both prevent crises and recover from them. Crisis preparedness involves protecting against fires, using computer forensics, and creating and maintaining a disaster recovery plan.

What is a disaster recovery plan? What role do computer forensics play in a disaster recovery plan? Using the Internet, locate a disaster recovery plan for an organization of your choice. What issues does this plan address? Is anything missing?

In a 0.5-1-page Word document, write a paper in the following format:

  • Paragraph 1: Introduction to the purpose of this paper.
  • Paragraph 2: Describe the components of a disaster recovery plan.
  • Paragraph 3: What role do computer forensics play in a disaster recovery plan?
  • Paragraph 4: Summarize the disaster recovery plan you found. What issue does this plan address? Is anything missing?
  • Paragraph 5: Conclusion

Lesson 5 Project Research/Preparation

Instructions: Rules and regulations are ever changing in regard to protecting information and finding weaknesses in a system. Information security risk assessments are becoming more and more important for corporations to conduct.

Using the web, research information security risk assessments. Find at least two good resources. You will write a paper that summarizes your findings.

Write a 2-page Word document in the following format:

  • Paragraph 1: Introduction describing the focus of the paper.
  • Paragraphs 2 and 3: Summarize the information from the two resources. What is an Information Security Risk Assessment? Why exactly are these important for a corporation? Who should conduct the assessment?
  • Paragraph 4: What are the methodologies for conducting an Information Security Risk Assessment?
  • Paragraph 5: What does a sample report look like?
  • Paragraph 6: What are the common criticisms of an Information Security Risk Assessment?
  • Paragraph 7: Conclusion
Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper