Assignment: Text book: “Real-World Exercises“.
From Chapter 1, page 37, Real World Exercise 1.1. provide answers to each of the stated questions (3-4 pages APA format with references)Discussion: Module 1
Discussion Question
Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion. (500 words)
Discussion: Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? (500 words)
Assignment: Text book: “Real-World Exercises”. From Chapter 2, page 81, Real World Exercise 2.2. provide answers to each of the stated questions (3-4 pages APA format with references)
Discussion:Search “scholar.google.com” for a company or school that has reported issues, problems, concerns about their backup procedures. Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information were lost or stolen. How should backup media be secured? What about off-site storage of backups?
Assingment: Text book: “Real-World Exercises”. From Chapter 3, page 123, Real World Exercise 3.1 and 3.2. provide answers to each of the stated questions (3-4 pages APA format with references)