Discussion 1: Technology Security
• Do you think that there is a need for classifying individual parts of a network? What is its importance in real-based applications? How can information asset security be enhanced by control techniques?
• How are the exposure and issues of logical access control explored with the help of access control software?
Discussion 2: Protection of the IT Architecture and Assets
• How are the risks of natural events mitigated through control measures of physical security? Why has business continuity been recognized as a fundamental component of management's role in achieving good corporate governance?
• Do you think that displacement control can cover a variety of threats? If yes, then in what ways? If not, then why not? Do you think that use of e-Commerce can impose serious challenges on organizations? Why or why not?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.