Explain how you would factor risk management practices


Discussion 1: "Managing Data Security"

Respond to the following:

• Imagine you are part of a security policy development team. Compose four policies that could prevent threats to the information assets of an organization. Select one policy you believe would be the best policy for strengthening data security and explain why.

• Explain how you would factor risk management practices into the development of the policies you constructed above. Outline specific measures, processes, and activities in your answer.

Discussion 2: "Applying Forensics Within the Enterprise"

Respond to the following:

• Distinguish the three most important factors that will protect and enhance the confidentiality and integrity aspects of data assets. Provide a rationale for your chosen factors.

• Imagine you are a member of an organization's forensics support team. Suppose that the data security countermeasures of your organization have been breached. Outline possible activities that you would perform to complete the digital forensic process. Determine the importance of establishing routine evaluations of security controls for ensuring consistent results.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Project Management: Explain how you would factor risk management practices
Reference No:- TGS02946040

Now Priced at $20 (50% Discount)

Recommended (98%)

Rated (4.3/5)