cis438 discusion questions

question one

Threats, Vulnerabilities, and Protection” Please respond to the following:

  • Select a type of organization (such as Financial or Health Care) and describe the legal ramifications of providing the security goals of confidentiality, integrity, and availability. Include the challenges of providing these security goals.
  • Select two different types of organizations (such as Financial or Health Care) and describe the similarities and differences with the types of computer and networking security protection, and security controls needed within the organization.

question 2

  • From the e-Activity, describe the threats and vulnerabilities of social engineering and social media; include how they are similar and how they are different.
  • From the e-Activity, describe the control measures that organizations and individuals need to implement to minimize the vulnerabilities associated with social engineering and social media
  • E-ACTIVITY=
  • Organizations and individuals must be aware of the vulnerabilities of social engineering and social media. Research the Internet to find the threats and vulnerabilities of social engineering and social media as well as control measures that organizations and individuals can implement to help control these threats and vulnerabilities. Be prepared to discuss.
  • This is not an essay just on line class discussions, i will need refrances that current.

"Order a similar paper and get 100% plagiarism free, professional written paper now!"

Order Now