Introduction to Security and Risk Management

 

Week 1.   Discussion                           Introduction to Security and Risk Management

 

CMGT/400

 

 

 

  1. Write a 100- to 200-word short-answer response for the following:

    Supporting Activity: Protecting Information

 

What is the mindset required to properly protect information? What role does reasoned paranoia play in this mindset and how can an individual keep the proper balance between protecting information and enabling business?

 

 

   2.   Write a 100- to 200-word short-answer response for the following:

 

Supporting Activity: Examples of Information Protection

 

How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example.

 

 

  3.  Write a 100- to 200-word short-answer response for the following:

 

Supporting Activity: Confidentiality, Integrity, and Availability

 

How do confidentiality, integrity, and availability all play key roles in protecting information? Explain what each means and describe how each works together to protect information.

 

 

   4.   Write a 100- to 200-word short-answer response for the following:

 

            Supporting Activity: Two Information Trends

 

What are the five different approaches to risk?   What are the pros and cons of each strategy?  Support your answer with solid reasoning

 

 

   5.   Write 100- to 200-word short-answer response to the following: 

 

You’re the chief security contact for MTS. One of your primary tasks is to document everything related to security and create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task?

 

 

   6.   Write 100- to 200-word short-answer response to the following:

   Measuring and Weighing Risk

 

    Explain which of the following policies should be used when assigning permissions, giving users only the permissions they need to do their work and no more?

   7.  Write 100- to 200-word short-answer response to the following:

    Measuring and Weighing Risk

   Explain which of the following strategies involves understanding something about the enemy and letting them know the harm that can come their way if they cause harm to you? 

    8.   Write 100- to 200-word short-answer response to the following:

    Measuring and Weighing Risk

 

    Explain which of the following policies describes how the employees in an organization use company systems and resources, both software and hardware?

 

 

 

In case you have a similar question and need it answered for you just say write my essay. At Academized we have all the most qualified academic writers and tutors, for all your assignments, essays, cases studies, discussion posts, project proposals, research papers, discussion posts, nursing assignments, admission essays, blog articles, and other forms of academic work.

If you don’t want a custom paper, just buy a pre-written essay from Buy College Essay.