1. What can be done to deter someone from committing a crime?
2. What does CISSP Stand for? identify the ethical rules CISSP holders have agreed to follow
3. What laws in Georgia have been passed to prosecute computer crime.
4. Go to www.eff.com. What are the current top concerns of this organization?
5. How is an incident response plan different from a disaster recovery plan?
6. Describe the “mitigate” strategy. What three planning approaches are discussed in the text as opportunities to mitigate risk?
7. What is competitive disadvantage? Why has it emerged as a factor?