Please answer all 11 questions below.
Q-1 In studying computer security you may find that there is confusion between computer security and information security. What is the defining difference between these two different forms of security? Why are these differences so important?
Q-2 In Computer Security and Information Security we commonly see different titles for individuals or groups that attack computer and electrical systems. Take a few moments and research on the web the terms “cracker” and “phreaker”. These are both terms for system rule breakers. Discuss with your classmates your online findings of these different terms.
Q-3 Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of any examples where ethical hacking occurs? What is your opinion of ethical hacking and can it be beneficial?
Q-4 Everyone encounters situations of ethical dilemmas concerning computers whether it is at home or in the work place. Discuss with your classmates some examples or situations of ethical dilemmas.
Q-5 What is the best value that should be assessed when evaluating the worth of an information asset to the organization—replacement cost or lost income while repairing or replacing? Discuss with your classmates potential worth of certain assets such as client data and transactions. What should be considered when determining these values. You may also discuss some of the laws that have also been discussed in this learning plan that may also apply to determining whether or not specific assets can be ignored.
Q-6 Incident classification is based on the judgment of the information security professionals involved. Discuss with the class how one can determine if any given circumstance is business as usual, an incident, or a disaster.
Q-7 Keeping policies current is very critical to the integrity of a computer network in a company. Discuss how policies need to be updated to accommodate current events, threats, and changes.
Q-8 Which architecture for deploying a firewall is most commonly used in businesses today? Why? What are the reasons that VPN technology has become the dominant method for remote workers to connect to the organizational network? Discuss each of these with your classmates.
Q-9 The legal issues surrounding active defense (see “Trap and Trace Systems”) are constantly evolving. This provides an interesting focal point for discussing ethical responses to complex workplace issues. Discuss with your classmates these legal issues.
Q-10 Will biometrics involve encryption? How are biometric technologies dependent on the use of cryptography? Discuss the different types of biometric that you have seen available. What are some of the advantages and disadvantages of biometrics?
Q-11 Outsourcing is always a good discussion topic. Discuss the various elements of the outsourcing process—RFP, evaluation, contract award, and exit strategies. What are the advantages and disadvantages of outsourcing?
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.[order_calculator]