Reference no: EM131383778
Case Assignment
To know about a field and keep abreast with what happens, especially a field that changes and advances fast, it is important to know the "Who's Who" in the field. Bruce Schneier is a top information security technologist and author, and has been named by The Economist as "security guru" (see https://www.schneier.com). It will be worthwhile for you to visit his website on a frequent basis in you want to pursue a Chief Security Office career.
The following multi-media presentation delivers what Schneier's view on information security management. If you have bandwidth issue and can't watch the video, then you can hear his speech from the audio stream. In the presentation, Schneier suggests a framework of "feeling, reality, and model" and explains how these three should be in sync. He also emphasizes how the "feeling" of security plays a role and how important a person's cognitive perception (partially coming from the person's belief and culture) is.
Bruce Schneier discusses on Ted Talks the Security Mirage, October 2010 at https://www.ted.com/talks/bruce_schneier.
If you can't watch the video or hear the audio, then you must read the following article which covers the topic. Otherwise, you should still scan through the article to refresh what you heard and grasp some new concepts that didn't get explained in-depth in the presentation:
Schneier, B. (2008). The Psychology of Security. https://www.schneier.com/essay-155.html.
Another "Who's Who" in the security field is Mark Seiden (a Cutter Consortium consultant, 35 yrs of programming experience, on the technical advisory board of Counterpane, among top 50 CyperElite). Please listen to his speech, where Mark emphasized the need to build proper organizational and customer awareness of security needs.
Seiden, M. Speech.
There are many factors influencing one's belief. Culture is one factor, upbringing is another one. So is a person's education and exposure on the subject. I can't affect your culture or upbringing, but I would like to educate/expose to you some concepts that can influence what you think regarding to security. Remember, I am only scratching the surface here. You need to continue educate yourself and build awareness of security for yourself and your organization.
Mercuri, Rebecca T.; Neumann, Peter G. (2003) Security by obscurity. Communications of the ACM, 46 (11),160-160. (TUI library).
Hoepman, Jaap-Henk; Jacobs, Bart. (2007) Increased security through open source. Communications of the ACM, 50(1), 79-83. (TUI library).
Now it is time to write about what you learned in the background readings. Writing about what you learned is like digesting food. Only through your own language, you can truly assimilate and absorb.
After you have "strategically" read the above materials, and, more importantly, thought about them critically and inter-connectively, compose a 4- to 6-page paper on the topic:
Why is it important to build one's awareness and proper perception of information security? And how does one build such awareness/proper perception in the management of an organization?
In preparing your paper, you need to discuss the following issues, and support with arguments and evidence:
- What is the framework suggested by Schneier? Do you agree or disagree?
- How is Schneier's framework connected with the framework suggested in Module 1?
- Summarize key points from Seiden's speech.
- What are your views on "security by obscurity" and "enhancing security via open source"? What are they? Why do you hold your views?
- How would you help the managers in an organization to build security awareness and proper perceptions?
Identify behaviors and situations that constitute harassment
: Identify behaviors and situations that constitute harassment. Include examples related to both sexual harassment and harassment associated with other protected classes.
|
What were your primary takeaways from the given article
: What were your primary takeaways from this article based upon your perception? Was there anything that you disagreed with in the article based upon your professional experience?
|
What kind of variable is the company studying
: The researchers measure how many minutes it takes for half of the substance to exit the bloodstream. What kind of variable is the company studying?
|
Required and discretionary benefits
: Read relevant information in the Unit's readings. In a Word document, write an essay identifying those benefits that are required by law(s) and those that are discretionary. Be sure to incorporate/use terminology from this Unit that may apply.
|
What is the framework suggested by schneier
: In preparing your paper, you need to discuss the following issues, and support with arguments and evidence: What is the framework suggested by Schneier? Do you agree or disagree
|
Find a newspaper or magazine article
: Find a newspaper or magazine article in which some data are reported. For the data discussed in the article, answer the questions above. Include a copy of the article with your report.
|
Read relevant information in the unit readings
: In a Word document, write an essay outlining and briefly discussing the specific comp and benefits you would consider to be "ideal" at your place of employment. If you in the military, identify a civilian business at which you might like to work. ..
|
Determining the performance appraisals
: During your professional career, you may have received performance appraisals. In other cases, your compensation may have been tied to some performance variable. There are many aspects of performance management, compensation, benefits, and payroll..
|
Discuss about the post given below
: PSY369 A02:According to studies of graduates of bachelor-degree programs in psychology, entry-level positions tend to pay relatively little and may be relatively unsatisfying. Although the positions, pay, and reported job satisfaction of psycholog..
|