What weaknesses in choicepoint information security manageme

Assignment Help Basic Computer Science
Reference no: EM13308795 , Length: 1200 Words

Question 1. What weaknesses in ChoicePoint Information Security Management practices likely contributed to their data breach? Please explain how they contributed and what Choice Point could do to strengthen these areas.

Question 2. Discuss the pros and cons of two information security management models that would be appropriate for ChoicePoint to implement? Explain the strengths and weaknesses of each model within the context of Choice Point's business model.

Question 3. Design an information security metrics program that would provide ChoicePoint executives with visibility into the effectiveness of the security program in preventing future data breaches. What information security metrics would you recommend and why?

Question 4. What are the key risk areas that ChoicePoint (and the data broker industry) as a whole need to address to protect its information and to minimize the negative perception (and the resultant likelihood of restrictive laws being passed) of the industry as a whole?

Question 5. To what extent did each of the following three areas (technology, people, process) play in the ChoicePoint data breach? Explain.

Verified Expert

Reference no: EM13308795

Questions Cloud

Arch in western architecture perfected : When and where was the use of the arch in Western architecture perfected?
Increase the likelihood of transfer of training : What could be done to increase the likelihood of transfer of training (TOT) if the work environment conditions are unfavorable and cannot be changed? What specific steps could the trainer, management and the employee take to help insure TOT? Is the e..
Design the redo log groups : Discuss the thought process of DBAs as they design the redo log groups and members for a database. Analyze and comment on the different factors that will affect their decision.
Explain the good customer service : Your boss says: “Why do I need to tell you what type of learning capability I’m interested in? I just want a training program to teach employees how to give good customer service." Explain to the boss how “good customer service” can be translated int..
What weaknesses in choicepoint information security manageme : Question 1. What weaknesses in ChoicePoint Information Security Management practices likely contributed to their data breach? Please explain how they contributed and what Choice Point could do to strengthen these areas.
Governments versus markets role in reshaping system : With so many different stakeholders in the health care system, many with powerful political lobbies, it is understandable that the government was unable, until the Patient Protection and Affordable Care Act of 2010, to address the problems of cost, a..
Tic-tac-toe game : You have gathered your information on the AI for the Tic-Tac-Toe game and began to develop your own ways to improve it using C++. Now, it's time to present your findings in a final paper. Remember that your final analysis and recommendations m..
Ms word versus other processing program : MS word Versus other processing program
How would the physical security aspect of protecting compute : How would the physical security aspect of protecting computer assets relate in this case? Make sure to give some examples.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that generates a random integer

Write a program that generates a random integer in the (inclusive) range [0-9] (i.e. the set {0,1,2,3,4,5,6,7,8,9}) and ask the user to guess what the number is.

  Write a class encapsulating a course

write a class encapsulating a course. Where a course is assumed to have three attributes: a code name, a description and number of credits.

  What is the accuracy of a two-bit predictor

What is the accuracy of a two-bit predictor, assuming the predictor starts off in the bottom left state? What if the pattern repeats forever?

  Explain what is done to prevent wayward system administrator

Explain what can be done to prevent wayward system administrators from simply looking up user passwords in host machine password file?

  Design pattern from the sun blue print designs

Choose a design pattern from the Sun Blue Print Designs and apply it to your problem. Describe in a Word document how you would apply the pattern including UML diagrams where appropriate. Save your assignment as a Microsoft Word document.

  What can be the record source of the form

What can be the record source of the form

  Write a complete main method that would print your last name

Suppose your name was George Gershwin. Write a complete main method that would print your last name, followed by a comma, followed by a space and your first name. Question 2 Declare a variable named myMenu suitable for holding references to Menu o..

  Discuss the role of the project manager or team

Summarize how the project manager or team exhibited exceptional and ethical project management practices. 2.Discuss the role of the project manager or team

  Find the value of (((a+b+)+c)+d)

find the value of (((a+b+)+c)+d) that would be computed in a floating point number system that has a mantissa approximately equivalent in precisions to 17 decimal digits. a = 99.0, b = 1.0*10^30, c=1.0*10^30, d = -98.0

  Explain how crc works at the data link layer

What are two reasons errors may occur at the data link layer?

  Write an ebnf rule that describes the while statement

Write an EBNF rule that describes the while statement of C++. Write the recursive-descent subprogram in C++ for this rule.

  How could tcp and udp know the values in the ip header

When adding a per-segment checksum to a segment, TCP and UDP include some fields in the IP layer before the segment has been passed to its underlying layer, the IP layer. How could TCP and UDP know the values in the IP header?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd