Reference no: EM13308183
Q1 Answer Case Exercises (page 208) from Whitman, M.E. & Mattord, H.J. (2010) Management of Information Security 3ed Course Technology:Boston
Q2 Discuss how does an information security framework relate to the information security blueprint and how might an information security professional use a security model?
Q3 Visit the Web sites of the major technology organisations listed in this chapter (Microsoft, Oracle, and Cisco) plus those of two you choose on your own. Search their Web sites for best security practices. What do you find?
Q4 If an organization has three information assets to evaluate for risk management purposes as shown in the accompanying data, which vulnerability should be evaluated for additional controls first? Which vulnerability should be evaluated last?
Q5 Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest.
Q6 How is an application layer firewall different from a packet filtering firewall? Why is an application layer firewall sometimes called a proxy server? Discuss the advantages and disadvantages of cache proxy server in security context.