Assignment: IT Security and Policies
Question One
What is the difference between the sender and the holder of the digital certificate? How to consider that a digital certificate is valid? How can one obtain a digital certificate for one public key without disclosing the private key?
Question Two
Describe the relationship between the incident response and the forensic analysis.
Question Three
A data breach occurs when the data for which your company /organization is responsible suffers from a security incident resulting in a breach of confidentiality, integrityor availability.
Law Name Description Kind of data that should be protected Fine for violation
Cyber Data Protection
Telecom Data Protection
Discuss the two laws implemented in Saudi Arabia for data protection by filling the following table.
Law Name
|
Description
|
Kind of data that should be protected
|
Fine for violation
|
Cyber Data Protection
|
|
|
|
Telecom Data Protection
|
|
|
|
Question four
Effective information systems that can provide timely access to comprehensive, relevant, and reliable information at the time of disasters, are critical to humanitarian operations.
Discuss the two open source emergency management software for disaster by filling the following table.
Emergency Software
|
Description
|
Advantages
|
Disadvantages
|
Sahana Eden
|
|
|
|
DisasterLAN
|
|
|
|
Format your assignment according to the following formatting requirements:
1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.
3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.