1. Information assurance is critical for businesses. Determine whether or not businesses could benefit from applying CNSSI-4009 guidelines to define internal policies and procedures. Explain why or why not.
2. Provide five advantages and five disadvantages of SIEM systems to business environments. Determine whether you would consider SIEM systems sufficient for information assurance. Explain why or why not.
3. Activity trail with real-time auditing includes who, what, where, when, and perhaps why (5Ws). Determine which of the 5Ws, in your opinion, is the most important and why. Explain what is the most effective method of managing 5Ws and why.
4. Determine which part of information assurance (privacy, regulatory and standards compliance, auditing, business continuity, and disaster recovery) you would rate as the most critical for information assurance. Explain why.