Assignment 1 1.) Respond to the following prompts: a. Provide

  

Assignment 1

1.) Respond to the following prompts:

a. Provide a list of several current security incidents. Examine the cause of such incidents. What types of vulnerabilities led to the incidents?

b. Select one incident and discuss the short- and long-term impact the incident had on the organization.

c. Construct a short set of bullet points you believe would help mitigate such an incident. How would you implement such a set of policies? How would this help prevent employees from making security mistakes?

2.) The assignment should be a minimum of 300 words (excluding the citations) and provide three citations.

Assignment 2

1.) Respond to the following prompts:

a.Classify the types of cryptographic methods that are currently in use and describe their functionality.

b. What function does PKI play in secure transactions? Discuss any issues with the use of  PKI.

c. Discuss why physical security is important. Select several physical security measures and provide reasoning for their implementation.

2.) The assignment should be a minimum of 300 words (excluding the citations) and provide three citations.

Assignment 3

1.) Respond to the following prompts:

a. Identify the security components necessary to protect the information systems infrastructure.      What key hardware components should be implemented.

b. Why are authentication methods important in assuring that only authorized users are accessing the system? Classify the levels of access controls.

c. Explain the use of an intrusion detection system (IDSs). How does such a system identify an intrusion? Differentiate between network level and host-based IDSs.

2.) The assignment should be a minimum of 300 words (excluding the citations) and provide three citations.

Assignment 4

1.) Respond to the following prompts:

a. What types of threats can impact the operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)?

b. How can threats from Internet-based activities, such as the use of e-mail and web browsing, be mitigated? What is the responsibility of the user community in mitigating such threats?

2.) The assignment should be a minimum of 300 words (excluding the citations) and provide three citations.

Assignment 5

1.) Respond to the following prompts:

a. What types of security incidents are possible within an information systems infrastructure? Select one such incident and detail how you would respond to the incident.

b. Describe key concepts in computer forensics. What important practices should be followed when gathering forensics data?

c. Categorize the most important concepts related to legal, ethical, and privacy issues in the field of computer security. How would you go about implementing compliance to the policies in order to protect your organization?

2.) The assignment should be a minimum of 300 words (excluding the citations) and provide three citations.