Question 1: What techniques can be used to prevent unauthorized access to the company's information system resources?
Question 2: How can successful and unsuccessful attempts to compromise the company's systems controls be detected in a timely manner?
Question 3: What steps can management take to be prepared to effectively respond to security incidents?
Question 4: Justify your answers using appropriate reasoning and examples. Comment on the postings of at least two of your peers.