1. Assess BCP as a process that adds business value. Give your opinion on whether or not the argument that states BCP adds value is a credible argument. Explain why or why not.
2. Speculate the strategic values that could be realized by having an effective BCP. Provide a rationale for your answer.
3. Organizational end users are generally in the background when it comes to protecting the IT infrastructure. As the chief security officer (CSO), develop a security awareness training communication plan for these users. Your plan must be in nontechnical terms to the user population that incorporates the confidentiality, integrity, and availability of the organization's information assets.
4. Give your opinion as to whether ethics training and security training should be conducted together within an organization. Explain your answer.
5. Microsoft Office has built-in object linking and embedding which allows you create an object in one tool and paste into another tool. Describe three examples of when you would use object linking and embedding. Explain why you chose to describe the examples that you did.