1. Undertake research to find how security culture is developed and maintained in non-IT-based environments. How can lessons from these implementations be used for developing and sustaining IS security culture?
2. The recent security attack involving Sony disclosed personal information along with credit card details for millions of customers. The situation raises big concerns regarding personal privacy and security. Accurately identify and explain the Risk Management aspects that Sony must consider when addressing the level of preparedness for the security breach.