THESE ARE ALL DISCUSSION QUESTIONS AND REQUIRE ENOUGH INFORMATION TO ACCURATELY ANSWER THE QUESTION. PLEASE DO NOT SEND A HANDSHAKE IF DID NOT READ THE ASSIGNMENT OR YOU ARE UNABLE TO MEET DUE DATE.;Imagine you work for a medium-sized business in the information security department and suppose you?ve determined the need to structure and implement an incident response plan and team. Propose how you would make a business case for the management team, explaining why this is a needed component of the security program at the company.;Determine how you would design the incident response team, knowing that you would use six people from your current staff to comprise the team. Identify the role that each of these individuals would take and briefly discuss the tasks each would need to absorb.;Select a law that currently governs how technology can be used and discuss it in detail utilizing your own words. Determine whether or not you believe this legislation and other laws surrounding technology are keeping up with the changes and fast paced advancement of information technology and crime. Provide a rationale with your response.;Go to the Dark Reading Website to read the article titled ?1.5M Fine Marks a New Era in HITECH Enforcement? dated March 2012, located at http://www.darkreading.com/database-security/167901020/security/vulnerabilities/232700031/1-5m-fine-marks-a-new-era-in-hitech-enforcement.html., analyze the purpose of HITECH and determine how this act is helping to shape the future of breach notification and consumer protection. Conclude whether or not you believe legislation such as HITECH forces the hands of companies when a breach occurs and whether or not this is better for the breached companies in the end.;Examine the implementation issues for IT security policy development. Determine which of these issues are the most challenging for organizations to overcome and explain why.;Propose at least three control measures that organizations can implement to mitigate the potential issues associated policy development and implementation.;Develop a list of the key elements that need to be included in a security awareness program. Analyze how security awareness programs differ from security training programs.;Examine at least four common hindrances to organizations developing effective security awareness programs and security training programs. Propose solutions to these hindrances.
Paper#63735 | Written in 18-Jul-2015Price : $22