Please provide long answers for each and if references are used please provide at the bottom of each question. Also attached in word.
Need Help Writing an Essay?
Tell us about your assignment and we will find the best writer for your project
Get Help Now!Question 1 (25 points)
You have just been promoted to Corporate Information Security Officer (CISO) for a mid-level company that specializes in Point-of-Sale (PoS) technology.The primary responsibility of this role is to develop plans, policies, and physical control requirements and specifications for the company that specifically address the security posture facing this sector.With highly publicized breaches of clients using your PoS technologies, including Target, Delta, Best Buy, and many others, the company is looking to you to specifically do the following:
1)Develop policies, standards, guidelines and procedures to detail what users and administrators can do to maintain the security of the business systems and network.Write one example of each (policy, standard, guideline, procedure) that specifically protects a PoS network.This example should be written so that any client using your PoS technology can adapt the verbiage to their operations.
2)Explain how the growing use of wireless cellular technology has impacted data transmission and how factors, such as location, affect your company’s ability to protect confidential data.Provide examples of how this technology can be used to jam and hack PoS technology.
Question 2 (25 points)
The United States Air Force (USAF) recently announced that it will outsource “low-hanging” IT operations so that airmen are focused on Cyber Mission Defense teams.(https://www.fedscoop.com/air-force-outsource-low-hanging-operations-freeing-airmen-cyber-mission-defense-teams/)
You work as a Security Analyst for IBM and have been asked to write a briefing on how your company can provide the IT products and services needed by the USAF that provide a layered, or Defense-in-depth, security architecture.Detail how your recommendations will meet the national strategy to deny, deter, deflect, delay and detect cyber-attacks.
Question 3 (25 points)
Examine the legal, ethical and privacy aspects associated with Artificial Intelligence (AI) and Information Systems.Specifically, describe how the field of AI is being used to enhance each of the following sectors, and what legal / ethical / privacy issues are associated with industry information systems and AI:
1)Healthcare
2)Military drones
3)Social media and online entertainment (e.g., Pandora)
4)Travel
Question 4 (25 points)
You have been asked to evaluate online data storage, including the Cloud, and enhanced productivity tools, including Virtual Machine software, as cost effective tools for your company, which is an international manufacturer of private label over-the-counter pharmaceuticals.
Prioritize often conflicting Information Security requirements; Confidentiality, Integrity, and Availability, and potential options for outsourcing data storage and virtualization.Recommend access control tools and techniques that enhance the CIA requirements for each technology.
The post I need help answering Information Assurance and Security questions appeared first on MBA Nursing Papers.
Papershost.com is your go-to destination for swift and trustworthy essay writing assistance. Our comprehensive writing services encompass essays, coursework, research papers, and more, ensuring a seamless solution for all your academic needs. Entrust your writing assignments to our skilled writers and bid farewell to concerns and stress. Rest assured, your college papers are secure in our capable hands, promising a hassle-free and reliable experience.
Do not let academic stress weigh you down. PapersHost.com is here to empower you with exceptional essay and assignment writing services. Place your order today and experience the difference of working with a dedicated team committed to your academic success.