Use the Web to research an article LESS THAN 1 year old that deals with a security breach in a corporation, school or government

Use the Web to research an article LESS THAN 1 year old that deals with a security breach in a corporation, school or government

part 1 d3

Use the Web to research an article LESS THAN 1 year old that deals with a security breach in a corporation, school or government Some good Web sites to go to are http://www.wired.com , http://www.msnbc.com , http://www.csoonline.com/ , http://www.computerworld.com

  1. Summarize the article in one paragraph and be sure to mention the title of the article.
  2. What do you think the firm should have done in the area of better planning their risk control and setting corporate security policies?
  3. Include a link for the URL of your article and the date the article was written.

Reply to the main topic (140 word minimum) and reply to 2 other student posts (50 word minimum each reply post) to get full credit.The original posting is worth a maximum of 60% of the total points and each of the replies are a maximum of 20% each for a total of 100%. You will graded on the quality of your posts in content, grammar, and clarity of your writing.

part 2 d4

Internet Blocking

A company can legally monitor what an employee does online. With this in mind, address EACH of the following questions.

  1. Which company individual(s) should be responsible for monitoring employee website access?
  2. Should companies determine “inappropriate sites” – why or why not?
  3. What sites might companies choose to block and why?
  4. What rules would you (or your company) consider if an employee has broken the policy of not surfing inappropriate sites?
  5. What party(ies) should be involved in enforcing the policy and disciplining employees for their inappropriate surfing and why?

Reply to the main topic (220 word minimum)

part 3 d5

Hacking

Use the Web to research an article LESS THAN 1 year old that contains an article about “white hat hacking” or a company hiring an ex-hacker. Some good Web sites to go to are http://www.wired.com , http://www.msnbc.com , http://www.csoonline.com/ , http://www.computerworld.com .

  1. Summarize the Web article in one paragraph
  2. Is it ever ethical to engage in white-hat hacking?
  3. Would you feel comfortable hiring an ex-hacker?

Include a link for the URL of your article and the date the article was written.

Reply to the main topic (220 word minimum)

 

Answer preview…………………..

Part 1 d3

Title of the Article: As the Government Shutdown Drags on, Security Risks Intensify

Summary

The resolution path for the government is to shut down corporations due to an increased risk of cybersecurity. The law enforcement bodies are developed through intelligence engagement for federal employees, according to infrastructure security agencies and cybersecurity. The shutdown activities are meant to infiltrate networks where sophisticated hackers can penetrate to government operations. The intrusion of IT security is developed through the development and research of loss of knowledge. The law enforcement body is enhanced through recruiting…….

APA 716 words

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?