Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Discuss and present sample simulation resembling the Caffè Nero. Be creative and apply quantitative and qualitative measures as needed.
Explore what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring.
Are you notified if there is an attack on one of your devices? Does it detect Infrastructure Attacks? What is the risk management process?
Did the Register-Guard violate the NLRA in disciplining Prozanski? Explain. See Register-Guard v. NLRB, 571 F.3d 53 (D.C. Cir. 2009).
How would you use social media for a company? What policies would you enforce with the use of social media?
What types of items need to be placed inside of a Tweet in order to bring greater awareness of a business/product/service to the market?
Take a position favoring or opposing shadow IT. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.
Discuss the steps in designing and implement an information security program. What are some of the challenges in getting the program implemented?
Create briefing package with approval drafts of the three required documents. Place all three documents in a single MS Word (.doc or .docx) files.
Create a report with recommendations and implement. Identify a risk within any organization. Assess the risk based on the Smallwood's criteria.
Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
Analyze the importance of availability? Do you believe it should be more important than the other two tenants (confidentiality/integrity)?
Analyze why do organization have information deficiency problem? Suggest ways on how to overcome information deficiency problem.
From given video, propose how issues with hierarchical and flat structures should be resolved. Predict whether you would be more productive or less productive.
What technology replaced these products? What was important about the ‘switch' of the products?
With all the risks of cellphone apps and security today, would you agree to allow employees use their own phones in the workplace?
Analyze strategies utilized at one higher education institution to adopt ERM processes to fit the decentralized academic environment.
Briefly disucss how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
What other strategic processes are closely tied to ERM? What three kinds of risks are identified within the City of Edmonton?
What security controls and security countermeasures do you recommend for CardSystems Solutions to be in compliance with PCI DSS requirements?
What is cloud computing? What cloud computing terminology and concepts do one need to know to write the business case, why?
How information technology supports or makes possible the development of robots as intelligent as humans, smart machines and the IoT.
Analyze the organization's categorization of the data based on the Standards for Security Categorization of Federal Information and Information Systems.
Analyze the organization's sensitive data that must be protected. Describe at least 2 primary threats that could compromise the organization's data.
How is Zurich's Capital Management program helping their ERM program? Give some examples on how Zurich has created new value through their ERM program?