Analyze examples from the popular press where a security


Assignment : Security Policies

On the basis of your research and understanding, respond to the following:

Commercial banks usually make their privacy policies publicly available. Locate a privacy policy from your financial institution and evaluate it in terms of core information system security concepts.

Procure or define the corporate policy of a company of your choice. Compare the corporate policy with the security policy. Comment on the discrepancies if any. Suggest how alignment of corporate and security policies can be brought about.

Think of a fictitious software house developing software for mission-critical applications. Develop measures to assess the level of maturity for each of the Systems Security Engineering Capability Maturity Model level. Suggest reasons why your measures should be adopted.

Use one of the prescribed risk management approaches in the textbook to calculate the level of risks your department might face. Calculate the business impact and the extent of financial loss. After undertaking the exercise, comment on the usefulness of risk assessment in recognizing potential risks and generating relevant management strategies.

Analyze examples from the popular press where a security breach has occurred because the security policy had not been followed. Undertake research to find reasons why the policy was not carried through and followed. Relate you findings to Information Security (IS) security planning principles discussed in this chapter.

Each response should consist of 1-2 pages in a Microsoft Word document.

Port Scanners

Port scanners are small utilities that can find all open ports on a host and even describe the types of services that run on such ports.

Create a report of 2-3 pages in a Microsoft Word document that includes the responses to the following:

Explain the port scanner research, providing a short description of each of the following:

Compare and contrast different port scanners.

Discuss how port scanners can be used for positive tasks.

Describe how these tools can be used for malicious purposes.

Cite at least 5-10 references you reviewed using correct APA format. The references you cite must be reliable and should not include references from blogs and websites, such as Wikipedia. Support your answers with appropriate research and reasoning.

Support your responses with examples.

Cite any sources in APA format.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Analyze examples from the popular press where a security
Reference No:- TGS02449324

Now Priced at $55 (50% Discount)

Recommended (92%)

Rated (4.4/5)