AssignmentFor this module you are to complete the following assignmentsChapter 3, Exercises 1, 2, and 3 in the Management of Information Security textbookChapter 10, Exercises 3, and 4 in the Management of Information Security textbookModule 2

AssignmentFor this module you are to complete the following assignmentsChapter 3, Exercises 1, 2, and 3 in the Management of Information Security textbookChapter 10, Exercises 3, and 4 in the Management of Information Security textbookModule 2.

Assignment

For this module you are to complete the following assignments:

Chapter 3, Exercises 1, 2, and 3 in the Management of Information Security textbook

Chapter 10, Exercises 3, and 4 in the Management of Information Security textbook

Module 2

Ch-3

Ex 1. Using a Web search engine, find an article from a reputable source, published

within the past six months, that reports on the risk coming from inside the

organization compared to the risk coming from outside the organization. If the

article notes that this relative risk is changing, how is it changing and to what is

the change attributed?

Ex 2. Using a Web search engine, find five examples of values, vision, and mission

statements as well as public declarations of organizational strategy. Do these

examples express concern for the security of corporate information.

Ex 3. Search your institution’s published documents (or another organization’s),

including its Web pages. Locate its values, vision, and/or mission statement, as

well as strategic goals. Identify any references to InfoSec. Also look for any

planning documents related to InfoSec

Ch-10

Ex 3. Using a Web search engine, visit one of the popular disaster recovery/business continuity sites, such as www.disasterrecoveryworld.com, www.drj.com, www.drie.org, www.drii.org, or csrc.nist.gov. Search for the terms hot site, warm site, and cold site. Do the provided descriptions match those of this chapter? Why or why not?

Ex 4. Using the format provided in the text, design an incident response plan for your

home computer. Include actions to be taken if each of the following events occur

 

AssignmentFor this module you are to complete the following assignmentsChapter 3, Exercises 1, 2, and 3 in the Management of Information Security textbookChapter 10, Exercises 3, and 4 in the Management of Information Security textbookModule 2

Posted in Uncategorized