Use the internet or strayer online database to find


  • Use the Internet or Strayer online database to find security policies and risk management procedures an organization of your choice has implemented. Also, reference the NIST Publication of Capital Planning and Investment Control (CPIC) process, located athttps://csrc.nist.gov/publications/nistpubs/800-65/SP-800-65-Final.pdf. Be prepared to discuss.Note: Wikipedia and similar Websites do not qualify as quality resources.(THis is not a question)
  • Read the article "Big Data security, privacy concerns remain unanswered", located athttps://www.csoonline.com/article/744294/big-data-security-privacy-concerns-remain-unanswered. Be prepared to discuss.(THis is not a question)

 

  • From the first e-Activity, analyze the chosen organization's security policies and procedures, and provide an opinion of whether or not its policies and procedures are strong from an information security standpoint. Justify your opinion utilizing specific examples from your research.(question one)
  • From the second e-Activity, determine what you believe to be the top two (2) security concerns related to big data, and give your opinion of what you believe are appropriate solutions to those problems, if solutions do exist. Justify your response. (question two)

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Use the internet or strayer online database to find
Reference No:- TGS01173347

Expected delivery within 24 Hours