Hs computer security evolved into modern


Assignment 1

Information security within organizations has evolved and has become much more complex.  In a written paper, answer the following questions: 

  • How has computer security evolved into modern information security?
  • Who should lead a security team? Should the approach to security be more managerial or technical? Why?
  • What are the functions of laws, regulations, and professional organizations within information security?

Assignment 2

The policies that organizations put in place are similar to laws in that they are directives for how to act properly. Like laws, policies should be impartial and fair and are often founded on ethical and moral belief systems of the people who create them. In some cases, especially when organizations expand into foreign countries, they experience a form of culture shock when the laws of their new host country conflict with their internal policies.

Suppose that SLS Corporation has expanded its operations into your country. Setting aside any legal requirements that SLS makes to its policies to conform to your local laws, does SLS have an ethical imperative to modify its policies to better meet the needs of its stakeholders and their geographical region/country?

Directions:

  • Your paper should be two to three pages in length, not including the title or reference pages.
  • You must include a minimum of two credible sources. Use the Saudi Electronic University Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

Assignment 3

Conduct research on the internet to identify a recent cyber-attack on an organization.  Describe the occurrence and what could have been done to prevent the situation or lessen its impact. How might risk management have been used to lessen the impact?

Directions:

  • Your paper should be two to three pages in length, not including the title or reference pages.
  • You must include a minimum of two credible sources. Use the Saudi Electronic University Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

Assignment 4

Based on this week's readings and additional research, answer the following questions:

  • What is physical security?
  • What are the primary threats to physical security?
  • How are these threats manifested in attacks against the organization?

Directions:

  • Provide information from your readings and research to support your statements. Your paper should be two to three pages in length, not including the title or reference pages.
  • You must include a minimum of two credible sources. Use the Saudi Electronic University Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

Assignment 5

Identify a major information security incident that has occurred in the recent past (within the last five years). If possible, identify a breach that occurred in, or otherwise impacted, the Middle East. Review and analyze your chosen incident along the following dimensions:

  • What went wrong?
  • Why did it occur?
  • Who was responsible?
  • How could it have been prevented?
  • What advice would you offer to prevent such an incident from occurring in the future?

Directions:

  • Your critical evaluation should be four to five pages in length, not including the title or reference pages.
  • You must include a minimum of two credible sources to support your evaluation.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Hs computer security evolved into modern
Reference No:- TGS01736973

Now Priced at $25 (50% Discount)

Recommended (91%)

Rated (4.3/5)