Data Classification and Data Handling

Need tomorrow if possible.  Each question s

 

Cybersecurity

Question #1:

Need tomorrow if possible.  Each question s

 

Cybersecurity

Question #1:

“Managing Network Security Through Policies” Please respond to the following:

  • Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy and give three reasons why you believe this policy is an effective way to manage network security.
  • Assess the risks and threats that may occur if these policies are underdeveloped or unavailable. Recommend three technical appliances that may be used to implement a network security function within your assessment and justify your recommendations.

Question #2

“Developing Personnel Security” Please respond to the following:

  • Determine three reasons why an organization should define the boundaries of control, identify personnel security functions based on risks, and manage change within the work force. Select what you believe to be the most important reason and explain why.
  • Propose three activities that could be performed by the Human Resources Department to screen and hire personnel effectively. Choose one activity you proposed and justify how it would support personnel security functions.

Security, Strategy and Policy

Question #3

“Data Classification and Data Handling” Please respond to the following:

  • Assess the main policy elements governing data classification and data handling in organizations to ensure that data remain protected at rest and in transit. Describe the methods that organizations can implement to ensure that data remains protected at rest and in transit.
  • Determine which areas of the data life cycle are the most challenging to control and explain why (i.e., creation, access, use, transmission, storage, physical transport, and destruction).

Question #4

  • Briefly describe the main purpose of Business Impact Analysis (BIA), Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) policies. Determine how these policies are similar and how are they different.
  • Suggest a generally well-known example of an incident in the past 10-15 years, such as Hurricane Katrina, that highlights the importance of conducting the appropriate planning and development of these policies (i.e., BIA, BCP, and DRP). Identify the areas in your example that would be affected the most without a policy such as the ones mentioned above.

” Please respond to the following:

  • Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy and give three reasons why you believe this policy is an effective way to manage network security.
  • Assess the risks and threats that may occur if these policies are underdeveloped or unavailable. Recommend three technical appliances that may be used to implement a network security function within your assessment and justify your recommendations.

Question #2

“Developing Personnel Security” Please respond to the following:

  • Determine three reasons why an organization should define the boundaries of control, identify personnel security functions based on risks, and manage change within the work force. Select what you believe to be the most important reason and explain why.
  • Propose three activities that could be performed by the Human Resources Department to screen and hire personnel effectively. Choose one activity you proposed and justify how it would support personnel security functions.

Security, Strategy and Policy

Question #3

“Data Classification and Data Handling” Please respond to the following:

  • Assess the main policy elements governing data classification and data handling in organizations to ensure that data remain protected at rest and in transit. Describe the methods that organizations can implement to ensure that data remains protected at rest and in transit.
  • Determine which areas of the data life cycle are the most challenging to control and explain why (i.e., creation, access, use, transmission, storage, physical transport, and destruction).

Question #4

  • Briefly describe the main purpose of Business Impact Analysis (BIA), Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) policies. Determine how these policies are similar and how are they different.
  • Suggest a generally well-known example of an incident in the past 10-15 years, such as Hurricane Katrina, that highlights the importance of conducting the appropriate planning and development of these policies (i.e., BIA, BCP, and DRP). Identify the areas in your example that would be affected the most without a policy such as the ones mentioned above.