Question:

1.Imagine you work for a medium-sized business in the information security department and suppose you've determined the need to structure and implement an incident response plan and team. Propose how you would make a business case for the management team, explaining why this is a needed component of the security program at the company. Determine how you would design the incident response team, knowing that you would use six (6) people from your current staff to comprise the team. Identify the role that each of these individuals would take and briefly discuss the tasks each would need to absorb.

2.Select a law that currently governs how technology can be used and discuss it in detail utilizing your own words. Determine whether or not you believe this legislation and other laws surrounding technology are keeping up with the changes and fast paced advancement of information technology and crime. Provide a rationale for your response.

Go to the CERIAS website to read the study titled "Cyber Forensics: The Need for an Official Governing Body," located at https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2015-4.pdf. Determine whether or not you agree with the authors on the identified numerous issues within the digital forensics community and if more government regulation is needed in this arena. Additionally, suppose you were asked to propose how a governing body could be organized to assist in these issues and indicate what your structure might be.

3.Examine the implementation issues for IT security policy development. Determine which of these issues are the most challenging for organizations to overcome and explain why.Propose at least three control measures that organizations can implement to mitigate the potential issues associated policy development and implementation

.4.Develop a list of the key elements that need to be included in a security awareness program. Analyze how security awareness programs differ from security training programs.Examine at least four common hindrances to organizations developing effective security awareness programs and security training programs. Propose solutions to these hindrances/

    • 8 years ago
    information security A+ Tutorial use as Guide
    NOT RATED

    Purchase the answer to view it

    blurred-text
    • attachment
      information_security.docx